Editor’s Note: Federal sentencing has now placed a number on the kind of insider conspiracy that legal-tech and cybersecurity governance teams have been forecasting for two years. Ryan Clifford Goldberg, formerly of Sygnia, and Kevin Tyler Martin, formerly of DigitalMint, each drew 48 months on April 30 for running ALPHV BlackCat ransomware against the same kind of victim companies their employers were paid to defend — and the sentence shifts the incident-response and ransomware-negotiation insider question from a hypothetical risk to a documented federal benchmark.
For cybersecurity, information governance, eDiscovery, and data privacy professionals, the operational implications begin running immediately. Vendor-risk diligence on incident responders and ransomware negotiators now has a federal-prison-grade reference point. Cyber insurers, breach-counsel firms, and corporate procurement teams should reasonably expect new contractual demands for session logging, separation of duties between negotiators and forensic operators, and audit rights over vendor personnel changes. Litigation-hold and eDiscovery scope on ransomware retainers should expressly capture vendor-side artifacts.
Watch the July 9 sentencing of co-conspirator Angelo Martino, where loss totals approach $75 million. That number — and the resulting sentence — will tell us whether 48 months is the floor or the median for this class of conduct.
Content Assessment: A 48-month federal benchmark resets the incident-response insider question
Information - 92%
Insight - 91%
Relevance - 94%
Objectivity - 92%
Authority - 91%
92%
Excellent
A short percentage-based assessment of the qualitative benefit expressed as a percentage of positive reception of the recent article from ComplexDiscovery OÜ titled, "A 48-month federal benchmark resets the incident-response insider question."
Industry News – Cybersecurity Beat
A 48-month federal benchmark resets the incident-response insider question
Sentencing of two former Sygnia and DigitalMint employees converts a prosecutorial signal into a binding governance datum
ComplexDiscovery Staff
A federal judge in the Southern District of Florida on April 30 sentenced two former cybersecurity professionals to 48 months in prison each for using ALPHV BlackCat ransomware to attack U.S. companies they had been paid to defend. The sentence is the first federal prison term in the United States for an insider conspiracy run from inside an incident-response and ransomware-negotiation operation, and it converts a year of prosecutorial signaling into a hard compensation, governance and insurance datum that breach counsel and risk managers now have to price.
Ryan Clifford Goldberg, 40, of Georgia, a former incident response manager at the cybersecurity firm Sygnia, and Kevin Tyler Martin, 36, of Texas, a former ransomware threat negotiator at DigitalMint, each received the four-year sentence after pleading guilty in December to one count of conspiracy to obstruct, delay or affect commerce by extortion, according to the U.S. Department of Justice. Court records and the agency’s announcement place the conspiracy between April and December 2023, the same window in which both men were employed at firms whose business is helping victims survive ransomware events.
Working with a third co-conspirator — Angelo Martino, 41, of Florida, a former DigitalMint negotiator who pleaded guilty April 20 to a related extortion conspiracy — Goldberg and Martin operated as ALPHV BlackCat affiliates. The Justice Department said the three agreed to pay BlackCat administrators 20 percent of any ransom collected in exchange for access to the strain and to its data-leak extortion platform. Five victims were named in court documents: the Florida medical company, a Maryland pharmaceutical firm, a California doctor’s office, a California engineering company, and a Virginia drone manufacturer. The Florida medical company paid about $1.2 million in Bitcoin in May 2023 — the only ransom the trio successfully extracted, prosecutors said.
“The court’s sentences today reflect the damage that these defendants inflicted during their cyberattacks on victim companies throughout the United States,” said A. Tysen Duva, the assistant attorney general leading the Justice Department’s Criminal Division. Duva said the men “harmed important firms who were providing medical and engineering services” and went “so far as to cause the leak of patient data from a doctor’s office victim.” Duva added, “These were supposed to be cybersecurity specialists who did good and helped businesses and people. Instead, they used their high-level cyber skills to feed their greed.”
U.S. Attorney Jason A. Reding Quiñones for the Southern District of Florida said the defendants “exploited specialized cybersecurity knowledge not to protect victims, but to extort them” and that the four-year sentence reflects “not only the scale of this scheme, but the real harm inflicted on businesses, employees, and victims whose private information was weaponized for profit.”
Both employers said the conduct fell outside their corporate knowledge and infrastructure. Sygnia said it terminated Goldberg as soon as the company learned of the situation and confirmed it is “not a target of this investigation.” DigitalMint’s chief executive, Jonathan Solomon, said the company “strongly condemn[s] these former employees’ criminal behavior, which violated our values, ethical standards, and the law” and said internal controls have since been strengthened. Prosecutors did not allege either firm was complicit, but the case has surfaced a structural concern that has been in the wings of every ransomware retainer for several years: the responder’s seat affords exactly the kind of access that adversaries elsewhere have to acquire by intrusion.
Goldberg also attempted to flee the country before arrest. “When Goldberg sought to flee abroad and escape prosecution, the FBI tracked him through 10 countries, demonstrating the lengths we will go to hold cyber criminals accountable and protect victims,” said Brett Leatherman, assistant director of the FBI’s Cyber Division. The investigation police at the Mexico City international airport assisted with the tracking, according to the Justice Department.
Why 48 months becomes a benchmark
For information governance, eDiscovery, and cybersecurity professionals, the sentence functions as something the trust-chain question, raised since the December 2025 guilty pleas, has been waiting for — a number. Until April 30, whether a rogue incident responder or ransomware negotiator would face hard prison time was an open prosecutorial question, useful in vendor-risk diligence but not yet binding. The 48-month figure now provides a federal benchmark that breach-counsel firms, cyber insurers, and corporate procurement teams can cite when negotiating retainer terms, indemnification language, and scope-of-access clauses with outside responders.
That benchmark matters because the operational pattern in the Goldberg and Martin case is one the industry has been quietly rehearsing controls for. The trio’s playbook required exactly the access points an authorized responder already holds: knowledge of victim networks, awareness of insurance posture, awareness of negotiating ceilings, and direct contact with both technical defenders and counsel. The Martino arm of the case, in which a separate DigitalMint negotiator allegedly shared confidential victim data with threat actors to inflate ransoms — and helped extract about $75 million across five paying victims, according to court filings — illustrates the same access surface used a different way.
What changes for compliance, eDiscovery, and cyber insurance
The compliance, audit, and procurement implications begin running immediately. Firms that retain incident-response or ransomware-negotiation vendors should expect insurers and breach-counsel partners to ask for documented internal-monitoring controls on responder activity, including session logging, separation-of-duties between negotiators and forensic operators, and contractual rights to audit personnel changes mid-engagement. Vendor questionnaires that ask about background checks and code-of-conduct training will evolve into questions about behavioral telemetry, anomaly detection on responder workstations, and forensic preservation of vendor activity for post-incident review.
For eDiscovery and information-governance leaders, the case adds a discrete operational item: vendor activity logs, chat transcripts with negotiators, and ransomware-negotiation correspondence are now reasonably foreseeable evidence in downstream civil litigation, regulator inquiry, or coverage dispute. Litigation-hold scope on a ransomware retainer should expressly capture vendor-side artifacts. Patient and customer data shared with responders should be segregated and tokenized — Duva’s reference to a doctor’s office leak is the kind of harm framework that will be cited in patient-class litigation and state attorney general complaints in the months to come.
Cyber underwriters are likely to move first. Carriers writing primary cyber towers can be expected to add insider-threat questions to renewal applications, ask for proof that vendors maintain user-and-entity behavioral analytics on responder workstations, and condition coverage triggers on documented vendor-side controls. Brokers should expect vendor-insider exclusion language to appear in policy markups, and policyholder counsel should test whether existing wrongful-act and dishonesty exclusions sweep in vendor employees acting outside the scope of their employment, as the Goldberg and Martin conduct did.
The sentencing also clarifies the disclosure question for securities monitoring. A vendor-side insider conspiracy that produces a federal indictment is a material counterparty-risk event for any sponsor or retained customer of the firm — and the U.S. Securities and Exchange Commission’s cybersecurity-disclosure rules, in effect since 2023, favor disclosure of supply-chain compromise events when the underlying access path is similar to a primary breach. Risk managers should track whether any of the five named victim firms — none publicly identified by name — surface in upcoming 10-Q or 8-K disclosures referring to the matter.
The road to Martino’s sentencing
Sentencing for Martino, the third defendant, is scheduled for July 9. He faces up to 20 years in federal prison.
The harder question for the field, and the one this case opens rather than closes, is whether 48 months becomes the floor for incident-response insider conspiracies or whether a higher-loss case — Martino’s, plausibly — pushes the number up. What does the responder-and-negotiator value chain look like when “trusted insider” is no longer a category of trust but a category of audit?
News sources
- Two Americans Who Attacked Multiple U.S. Victims Using ALPHV BlackCat Ransomware Sentenced to Prison (U.S. Department of Justice)
- Former incident responders sentenced to 4 years in prison for committing ransomware attacks (CyberScoop)
- Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks (The Hacker News)
- Two Americans Sentenced to Prison for Using BlackCat Ransomware to Attack Multiple Entities (DataBreaches.Net)
- US ransomware negotiators get 4 years in prison over BlackCat attacks (BleepingComputer)
- Cyber incident responders who carried out ransomware attacks given 4-year sentences (The Record from Recorded Future News)
Assisted by GAI and LLM technologies
Additional reading
- Data collection in occupied territory: A closer read of Cyber Law Toolkit scenario 35
- Cyber Law Toolkit tests surveillance and data collection under occupation
- The router on the shelf is now a national security problem
- Invisible by design: NATO’s 2026 cognitive warfare paper and the crisis of discovery
- When Your Legal Tech Vendor Gets Breached: DocketWise Incident Exposes 116,666 Immigration Records and a Profession’s Blind Spot
- The DOJ’s Cyber FCA Playbook Is Working as Enforcement Triples and Shows No Signs of Slowing
- FTC’s OkCupid Action Reframes AI Training Data as a Consumer Protection Issue
- White House AI Framework Signals New Compliance Stakes for Legal, Cybersecurity, and eDiscovery
- The Gatekeeper’s Key: How the Conformity Assessment Unlocks the EU AI Market
Source: ComplexDiscovery OÜ

ComplexDiscovery’s mission is to enable clarity for complex decisions by providing independent, data‑driven reporting, research, and commentary that make digital risk, legal technology, and regulatory change more legible for practitioners, policymakers, and business leaders.


























