Simon Smith, Forensic Cyber Security, Cybercrime, Analyst, Investigator & Programming Expert of over 22 years.
A vCISO, CCISO CFE CHFI CNDA KYC CEH CCE CIPM MPM CCSA CAMS CIRS CCIP ACE MCSE MCSA PRINCE2 COBIT5 ISO27001 LA CPT PSM CSD ITIL SSBB C|BP CIBP CCSE CCSM dCAA, 1st Responder, FDRP & NMAS Mediator. He has "the global standard for developer excellence", MCSD® App Builder®, has been labelled by SecurityNow’s Ken Hess as perhaps the “World's Best Investigator”. He is skilled in counter Intelligence, is an Hon. Blockchain Board Member with the IIB (EC-Council®) and a Certified Cyber Intelligence Professional (CCIP®). He is also a certified expert witness.
He has performed almost all IT, Cyber & IP/Mgmt/SDLC role(s) through his 22yrs of industry experience. An Analyst, Mediator, Forensic Expert, Detective, and has assisted police and media.
He specialises in criminal and civil cyber cases of stalking, e-fraud and corruption. He holds 10 PGrads +:
- CCISO® - Certified CISO
- CFE® - Certified Fraud Examiner
- CHFI® - Computer Hacking Forensic Investigator
- CNDA - Certified Network Defender Associate
- CEH® - Certified Ethical Hacker
- CPT - Certified Penetration Tester
- ISO 27001 Lead Auditor
- COBIT5
- Prince2 Practitioner
- C|BP®- EC Council
- MCSD® - (App Builder), MCSA®x3
- MCSE® - Analytics & Mobility
- KYC - AML/CTF
- ACE® - Palo Alto
- CCSE® - Checkpoint Security Expert
- CCSM® - Checkpoint Security Master
- PSM® Scrum Master
- Certified Bitcoin Pro (CBP®) C4™
- CSD® - Solidity Developer
- SSBB™ - 6Σ BB
- JS Developer (W3Schools® - Honors 98%)
- Blockchain Expert (BC Council™ CBE®), Dev (CBD®)
- Ethereum, Crypto Expert (CEE®,CCE®)
- Research Specialist (CIRS®)
- MS Security - CSO & IT Pro's Cert, DevOps
- MCert. Detecting Deception - Steve Van Aperan
- Criminology, Profiling + Forensic Science (ICOES)
- CSU, IT Masters, Computer Forensics, Cyber Warfare & Terrorism
- Newcastle Uni, Cert. in Cybersecurity
- PRI® - NMAS Mediator & FDRP
- ITIL®
- Asterisk® dCAA - VOIP and digital sound processing expert
DHS Recognised
- Cyber Threat Analyst (CCTA)
- Cyber Intel Pro (CCIP)
- Criminal Investigator (CCCI)
- Social Media Intel Expert (CSMIE)
- e-Com Fraud Investigator (CEFI)
- Work Violence & Threat Spec. (WVTS)
Significant Cases
- Victoria Police vs ABDELMALEK (Major stalking case involving former Home and Away start Lincoln Lewis);
- AFP vs *SUPPRESSED* (Made a major difference to this case which involved a life sentence - relating to encryption);
- 2 VCAT cases involving software engagement auditing and whether the software was or is "fit for purpose";
- Independent Expert in a Magistrate Cyber-stalking case (parties confidential);
- Expert Witness in County Court Matter involving software dispute and signature authentication dispute involving "A Current Affair" and defamation;
- QLD District Court Facebook injunction matter involving expert evidence relating to an urgent "injurious falsehood" case;
- Many more...plus countless opinions, confidential family law matters, reports and opinions leading to mediations, legal aid work and more.
Simon Smith is a successful cyber forensic investigator, analyst and certified fraud examiner. He is also one of Australia's highest profile expert witnesses in cybercrime, cybersecurity, cyber-defense and cyber-law backed cases in all jurisdictions. He holds (as a very basic few - just in certifications), a CFE, CEH, CHFI, CPT, PRINCE2, COBIT5, ISO27001 LA, CNDA, CAMS, CCISO, CCE, ITIL, CIPM, PSM, MPM, MCSD, CLA, MCSE, CCSA, ACE, CCSM, 6ΣBB, over ten Post Graduate Certificates and Diplomas, over ten US Department of Defense recognised Cyber Qualifications and over 22 years of industry experience.
Areas of expertise
- Qualified Cyber Forensic Independent Expert Witness that produces superior results
- Certified Chief Information Security Officer
- Internationally Accredited Forensics Investigator
- Certified Access Management Specialist
- Fraudulent Document Identification
- Finding owner of Fake Accounts Expert
- Cellebrite, Macquisition Extractions
- Computer Software Dispute Expert
- Project Management SDLC Expert
- Online Forensic Investigations
- Litigation Assistance Expert
- Computer Programming Auditor
- PSIO/AVO Technology Abuse
- Online Document Examination
- Cyber Security Investigator
- Government Investigations
- International Scam Expert
- Social Media Intelligence
- Breach of Confidentiality
- Computer Forensics Expert
- Insider Threat Detection
- Certified Ethical Hacker
- Certified Fraud Examiner
- Cyber-harassment expert
- Australian Consumer Law
- Insurance Loss Adjuster
- ISO 27001 Lead Auditor
- Cyber-terrorism expert
- Insurance Investigator
- Trademark infringement
- Copyright Infringement
- Surveillance detection
- Confidentiality breach
- Cyber-stalking expert
- Cyber-bullying expert
- Right to be Forgotten
- Intellectual Property
- Stolen Cryptocurrency
- Android & iOS Expert
- Cryptocurrency Scams
- Crisis Loss Adjuster
- Expert Witness Rules
- Computer programming
- Corporate Resilience
- Cyber Data Breaches
- Cyber Loss Adjuster
- Reverse engineering
- Patent Infringement
- Conflict resolution
- Online surveillance
- Penetration Testing
- White Collar Fraud
- Social Engineering
- White Collar Crime
- IP Address Tracing
- Insurance disputes
- Internet Liability
- Restraining Orders
- Breach of Contract
- Internal Espionage
- Falsified Invoices
- Police Corruption
- Blockchain Expert
- Digital Forensics
- Online Defamation
- Counter Terrorism
- Document Analysis
- Crisis Consultant
- Criminal Code Act
- Website Hijacking
- Cross examination
- Investment Scams
- Digital Currency
- Money Laundering
- Recording Device
- Tracking devices
- Marital Disputes
- Employee threats
- Insurance claims
- Cyberterrorists
- Cyber Insurance
- Virus detection
- Takedown Notice
- Internet Trolls
- High-tech crime
- Security Breach
- Risk Assessment
- Child Abduction
- Cyber Security
- Cybercriminals
- Cryptocurrency
- Cyber Stalking
- Cyber Bullying
- Voice Analysis
- Cybersquatting
- Report writing
- Mobile Devices
- Ethical Hacker
- Fake Accounts
- Cyberscammers
- Cyberstalkers
- Cyberbullying
- Email Tracing
- Cybersecurity
- Gang Stalking
- Hidden assets
- Trade Secrets
- Data Recovery
- Security Risk
- Online Fraud
- Online Scams
- Social Media
- Cyber-attack
- Conciliation
- Cyber Attack
- Black Market
- Internet Law
- Cyber Expert
- Machine Code
- RFID Expert
- Cyber Crime
- Google Blog
- Court order
- Arbitration
- Bad Reviews
- Source code
- Objective C
- KYC Expert
- Catfishing
- Lost funds
- Blockchain
- Craigslist
- Cyber loss
- Crimes Act
- Bankruptcy
- Family law
- EDiscovery
- Harassment
- Corruption
- Data Loss
- Deepfake
- Phishing
- Pharming
- Dark Web
- Stalking
- Facebook
- Auditing
- Hardware
- Software
- Firewall
- ID Fraud
- Firmware
- Analyst
- Bitcoin
- E-Crime
- Malware
- Tracing
- Privacy
- Android
- Google
- ECrime
- Spying
- Router
- IPhone
- Cults
- Cyber
- ACORN
- SCAMS
- COBOL
- DDOS
- DMCA
- RFID
- CSRF
- Java
- .NET
- Perl