Data Security Expert Witnesses
What is a data security expert witness?
Data security expert witness candidates typically have a background and expertise in computer science, information security, cyber security, and/or computer forensics. A data security expert witness should feel confident explaining digital evidence and technology to a judge and jury. In a high-profile case, or litigation involving a significant financial stake, a law firm may request a data security subject matter expert with prior expert testimony experience.
What types of cases require a data security expert witness?
Data security protects digital data from unauthorized users. Representative litigation matters requiring a data security expert often involve issues pertaining to patent infringement, trade secret disputes, data breach, cybersecurity, and fraud. Law enforcement have also utilized the expertise of a data security experts to discover electronic evidence in a criminal investigation.
What litigation support work might a data security expert witness be expected to perform?
Litigation support by an information security expert witness can include a review of the underlying technology, a digital forensic investigation, an expert report, expert opinion, depositions, and courtroom testimony. A forensics expert can reverse engineer components to prove (or disprove) intellectual property infringement, theft, or cybercrime. Attorney clients may also utilize a computer security expert or cybersecurity expert for pre-litigation consulting work.
Cahn Litigation Services has the experience required to turn a search for a data security expert witness around quickly, providing the right balance of expertise and testimony experience.
Related Disciplines
Data Security Expert Witness - Representative Bios
Please Note: All Cahn Litigation expert witness searches are customized to attorneys' precise specifications and preferences. Attorneys are encouraged to discuss search parameters with a Cahn search specialist.
The below expert witness bios represent a small fraction of those Data Security experts known by Cahn Litigation Services. These bios are provided to give lawyers a sense of the Data Security landscape.
Expert Witness #222611
This expert received a Ph.D. in Computer Science. This expert joined a prestigious University and is Associate Director of its Applied Research Institute where this expert is working with projects related to national security. Specializing in network protocols, telemedicine, electronic commerce, medical data privacy and security, this expert was a National Lecturer, gave keynote addresses at several leading conferences, and is a Fellow of the IEEE. This expert has supervised over 130 funded research projects, advised 68 PhD and master's students, and co-authored two books, 14 book chapters, and 170 refereed journal and conference publications. This expert and colleagues developed a Transport Protocol (supporting multicast and knowledge of the multicast group members) for the US Navy, and then turned it into a commercial product. This expert's current research focuses on medical data privacy and security, implemented by supporting authentication, authorization, and federation across trust domains. This expert is also developing delta compression algorithms for diverse environments. This expert was a Founding Director of an Internet Technology Innovation Center, which provided technical and business strategy for e-business, and developed e-commerce software for corporate and government clients. Other projects include improving security for mobile devices, evaluating relational keyword search techniques, and writing software that can perform a scientometric analysis of scientific literature.
Start Data Security Expert SearchExpert Witness #248794
This expert is both an Independent Consultant and Expert Witness, as well as an Associate Professor of Engineering Practice. As part of this expert's academic responsibilities, this expert teaches courses on Internet of Things (IoT), Computer Networks, System-on-Chip, Special topics: Software Design and Optimization for Electrical Engineers, and System Verification where the focus is on various algorithms that directly relate to mobile transactions and the security issues associated with them. This expert also performs research on various security and safety aspects of systems, including those in IoT, cloud and data centers. Several of this expert's publications are related to security, verification and optimization of mobile/cloud/data center systems. This expert has been involved in several patent litigation matters related to cloud computing, mobile systems, edge computing, and secure software licensing transactions. This expert has given deposition testimony but has not yet testified at trial. This expert is well published and has presented at industry conferences.
Start Data Security Expert SearchExpert Witness #263553
This expert is an internationally recognized Information and Communications Technology (ICT) architect with expertise in designing and deploying enterprise-class solutions in a wide range of technologies and business sectors. This expert's extensive experience spans industry, U.S. Government, and academia environments. This expert is also a practicing security and privacy professional, who has specialized in data protection and storage security, where this expert is recognized as one of the top experts in the world.
This expert is an Associate Member of the American Bar Association (ABA) and been active with the Section of Science and Technology Law (SciTech). In addition to speaking and publishing on behalf of the ABA, this expert has served in several SciTech leadership roles. This expert is also actively involved in the ABA's Internet of Things (IoT) National Institute and the Artificial Intelligence National Institute.
Additionally, this expert has actively contributed to the efforts and projects of key ICT-based standards development organizations and industry associations as part of a focus on advancing the state of various technologies. This expert's passion for technology has been recognized in the form of awards and leadership positions in organization such as ISO/IEC, the InterNational Committee for Information Technology Standards (INCITS), the IEEE Computer Society, the Cloud Security Alliance (CSA), and the Storage Networking Industry Association (SNIA). This expert is or has served in an editorship role on the following international standards projects: ISO/IEC 22123 (Cloud computing -- Concepts and terminology), ISO/IEC 27031 (ICT readiness for business continuity), ISO/IEC 27050 (Electronic discovery), ISO/IEC 27040 (Storage security), ISO/IEC PAS 16248 (TLS for Storage Systems), Rec. ITU-T 3500 | ISO/IEC 17788 (Cloud computing -- Overview and vocabulary), and IEEE 1619-2018 (XTS-AES).
This expert possesses a unique set of professional credentials that include the (ISC)2 CISSP-ISSAP, ISSMP, and ISSEP certifications as well as the ISACA CISA, IAPP CIPT, and CSA CCSK certifications.
Start Data Security Expert SearchExpert Witness #262598
This expert is among the world's leading authorities in the areas of election voting security, critical infrastructure, and network system security. This expert is a recipient of an award for work on electronic voting. This expert is well known for taking part in a series of e-voting security studies in the U.S. and around the world. A memory card hack demonstrated against select voting machines appeared in a documentary. As a consultant, this expert has conducted and co-authored many studies on various election systems' data security and vulnerability. These studies have come at the request of officials, legislators and policy makers in five countries; including the U.S. government, at both the state and federal level.
This expert is the author of four U.S. patent applications for encryption and security and several additional international patents. This expert has testified on several occasions in cases relating to voting and elections.
Start Data Security Expert SearchExpert Witness #251048
This expert received a Ph.D. degree in electrical engineering. This expert's research is in the broad area of wireless communications and networking, with particular emphasis on resource management, distributed protocols, and security. This expert has worked extensively on secure verification of location and timing information, including privacy preserving audit mechanisms. This expert's research in this area focused on third-part privacy preserving audits of encrypted control messages (e.g., secure sensing measurements that must be accompanied by time and GPS coordinates) in various contexts, including wireless sensor networks, storage systems (verifiability of stored data in cloud storage), location-based message verification in packet relaying, and others.
This expert has been involved in NSF and DoD funded projects related to cognitive radio networks; shared and dynamic spectrum access; coexistence of heterogeneous wireless systems (e.g., LTE-U/WiFi); wireless security (e.g., obfuscation of transmission signatures, MIMO-based friendly jamming; insider attacks, selective-reactive jamming/dropping, game-theoretic countermeasures); 802.11 WLANs; power control protocols; multi-channel MIMO systems (including virtual/cooperative MIMO); mmWave systems; secure satellite communications; energy management in solar-powered WSNs; full-duplex communications and self-interference suppression; and media streaming over wireless links. This expert worked on packet scheduling and buffer management in switches and routers, QoS provisioning, fault monitoring/detection in optical networks, effective-bandwidth theory, traffic characterization, voice-over-IP, and video-on-demand systems. This expert has published more than 250 journal articles and peer-reviewed conference papers, and is a co-inventor of 5 granted/pending US patents. This expert's grants include 20 competitive NSF awards, 16 of which this expert served as the sole or lead PI. This expert was a keynote speaker at various conferences, including IEEE ICCSP, IEEE CRESS, IEEE CCW, IFIP Wireless Days, and the IEEE Workshop on Wireless Mesh Networks. This expert was an invited panelist at various international conferences. This expert gave tutorials at premier wireless networking conferences and frequently consults for companies in the telecommunications sector.
Start Data Security Expert SearchExpert Witness #121596
This expert is a nationally recognized expert in the field of telecommunications and information technology. This expert’s expertise encompasses a broad range of technical and managerial disciplines including voice communications, data networking, carrier services for public/private switched & dedicated networks, image processing, wireless and cable transmission systems, security systems including intruder detection, access control and video surveillance as well as operational and strategic planning. As co-founder and President of a highly sought-after consultancy, this expert is responsible for overseeing corporate operations and providing executive level direction on strategically significant projects. This expert has worked for various organizations in a consultative, design/engineering and managerial capacity. This expert has supported numerous clients with respect to technology consulting in the financial services, high technology, legal, corporate, health care and education sectors. This expert’s technical practice encompasses strategic planning and expert witness litigation support. This expert worked in the military aerospace industry developing strategic and tactical command and control systems for various agencies in the defense and intelligence communities. In addition to litigation experience, this expert and firm have performed an extensive patent portfolio review for a large company working with their in-house Intellectual Property group. In that project this expert evaluated 2 portfolios comprising over 120 patents. The team is highly knowledgeable about the Switched Ethernet and Optical networking marketplace.
AREAS OF EXPERTISE
- Packet Radio
- Packet Switching /Internet Protocol
- Packet Speech / Voice over IP
- Satellite communications
- Telephone switching systems
- Video Surveillance Systems & Video Digitization
- Voice digitization/voice processing
- Voice messaging
- Wireless Communications Systems
- Automated out dialing systems
- Access control systems
- Automatic Call Distribution (ACD) & Interactive Voice Response (IVR)
- Cabling & Wire-based systems
- Cellular telephony
- Intrusion detection systems
- LOS Microwave Systems
- Mission - Critical Infrastructure Design for Data Centers
- Mobility management
Start Data Security Expert SearchExpert Witness #218702
This expert has many years of development and operations experience in high technology companies. This expert has made hands-on technical contributions to numerous business software application development efforts. This expert’s knowledge and experience extends over three principal areas: (1) Architecture and design of complex web-server and client-server business software systems, (2) detailed design and coding techniques for business software applications, and (3) software project management and development contracts. This expert’s detailed programming knowledge encompasses Java, C, C++, ASP, Python and Visual Basic languages, as well as assembly language for Intel and 68K microprocessors and real-time DSP applications. This expert has also managed programming teams that created applications for mainframes. This expert’s networking experience includes TCP/IP router development for Ethernet LAN's, fiber optic links, and wide area networks. This expert has managed many client-server and web-based ERP business solutions projects for Financial, Inventory, Order Entry, Shipping, Supply Chain and Manufacturing core modules. This expert has worked on semiconductor manufacturing systems involving yield prediction and supply chain management using statistical forecasting. This expert has direct experience with Oracle 8.05, 8i and 9i as well as SQL Server 7.0 and SQL Server 2000 for both transactional and data warehouse systems. This expert has also held responsibilities for internal network operation, intranet, and public access web server IT functions in several corporations. In this role this expert gained a detailed understanding of security issues such as SSL, user authentication, network security, firewalls, hacking countermeasures. This expert is also knowledgeable about email servers, backup and restore procedures, and service level agreements for customer-outsourced data in ASP systems.
This expert holds a B.S. degree with 1st Class Honors, an MSEE, and a Ph.D. also in Electrical Engineering. This expert has extensive litigation experience including deposition and courtroom testimony, claim construction for Markman hearings, infringement and validity rebuttal reports in support of plaintiffs, as well as numerous non-infringement and invalidity reports on behalf of defendants.
Start Data Security Expert SearchExpert Witness #259700
This expert holds a PhD in Computer Science, serves as an Associate Professor for a College of Information Systems as well as director of a Human-Computer Interaction Lab. Specializing in web, privacy and social media, this expert's work began professionally as a web designer. This expert started a web design company that built commercial websites. Since moving to academia, this expert has taught web design and web programming and written a textbook on web design.
This expert's work spans many areas, but core research interests are in understanding how people use social media to improve the way they interact with information. This expert approaches this from a computer science perspective and this expert's general research hits social networks, trust, web science, artificial intelligence, and human-computer interaction. This expert has done a lot of work looking at how to infer information about people (like personality and political preferences) and their relationships (like trust) from social media. This expert also works on usable security, bringing HCI to the design of security and privacy systems.
Areas of Expertise include:
- Social Media- Social Networks- Information Organization- Web Sciences- Recommender Systems- Code analysis and review- Semantic Web and Big Data- Human-Computer Interaction- Online PrivacyThis expert has extensive experience as an expert witness analyzing intellectual property issues, including patent validity and infringement and prior art. This expert has work as a technical expert, both pre-trial and in trial, on the workings of most major social media systems and recommender systems as well as the history and development of the web, web science, social networks, and social media.
Start Data Security Expert Search