This highly qualified expert has over 20 years of experience in cyber law and security and is a practicing attorney. He earned his BS and MS in information systems from the University of Alabama and Grantham University. This expert then went on to earn his JD from Birmingham Law School and complete two PhD programs: one in management from Walden University and the other in business administration from Northcentral University. He is a member of the privacy and computer ...
This highly-qualified expert has extensive experience in cyber law, risk management, and insurance, as well as data breach response and e-commerce. He earned his BA from Gonzaga University, his JD from Washington University School of Law, and his LLM in cyber and telecommunications law from the University of Nebraska. Today, this expert is a practicing attorney who specializes in cyber law and insurance. Formerly, he served as the director of the Make-A-Wish Montana and ...
This expert has nearly 30 years of experience in data architecture, pre and post-incident attack reconciliation and AML auditing data. He is a senior AML security architect, cube designer, CISSP STIG auditor, Microsoft certified trainer, SQL SSAS Expert, CAMS+FCI Certified Anti-Money Laundering instructor and specializes in data security reconciliation and analysis. He is also an advisory board member for the Cybersecurity for Business program at a university in South ...
This expert has nearly 35 years of experience in the prevention of cyber crime and identity theft. Among the top consumer security and identity theft experts, he has worked with financial firms, governments, intellegence organizations, and Fortune 500 companies on identity theft education and prevention. He has acted as advisor to numerous security firms, including Check Point, Websense, Ntru Cryptosystems, Securify, and SiteLock, as well as several identity protection ...
A computer engineering and computer electronics expert witness advises on a case involving the alleged tampering of electronic medical records (EMR) arising out of a medical malpractice claim. The issue involves whether or not a referral was made to a…
A forensic computer architecture expert witness for the defense discusses computer forensics, information security, computer science, and internet security as it pertains to temporary internet files. This case involves a man and his wife who had a strained marriage. They…
This case involves a seventeen-year-old boy with Down syndrome who posed for a picture showing him and his artwork. The picture went viral on the Internet /network communications after a website generator featured the picture, labeling it a “Retarded Handicap Generator.” The website allowed users…