Scott assists Kroll clients with a wide range of cyber-related matters through advanced investigative digital forensics and intrusion response-related work, encompassing both onsite and remote digital evidence collection, triage and in-depth analysis. Representative matters include cyber-based corporate espionage, Office 365 compromises and related log analytics, ransomware and malware intrusion events, breach response, point-of-sale and financial services fraud, threat hunting and response, matters involving PII and PHI spillage, malicious spear phishing and whaling campaigns and other events involving misuse of networked endpoints. Scott also uses his extensive field experience to facilitate cyber tabletop exercises (TTX), including scenario design, presentation and client action items.
Prior to joining Kroll, Scott worked for the FBI, where over the course of a 15-year career he primarily delivered computer forensic examinations and provided expert witness testimony in multiple federal and state courts. Additionally in this role, he performed search and seizure operations, led research and development initiatives and trained new field examiners. For three years, Scott concurrently specialized in information technology, coordinating the daily operations of critical applications and serving as the office authority for online capabilities and various computer programs that supported investigative efforts. Before that, Scott began his professional career as manager of desktop computing for the University of New Orleans. In that role, he oversaw nearly 80 full- and part-time employees involved in networking projects and in providing support for thousands of desktops, 1,500 faculty and staff members and 18,000 students.
Scott received a B.S. in computer engineering from Louisiana State University. He is also a Certified Field Instructor for the FBI.