CyberScoop | CISA infrastructure security official Brian Harrell steps down

Brian Harrell, a senior official in charge of physical infrastructure protection at the Department of Homeland Security’s cybersecurity agency, resigned his post on Thursday and is headed to the private sector.

“During my time at [the Cybersecurity and Infrastructure Security Agency], we have responded to hurricanes and historic floods, provided expertise after mass-shootings, engaged thousands of critical infrastructure owners and operators, and we are now providing the private sector assistance during COVID-19,” Harrell wrote in a resignation letter to President Donald Trump.

Harrell, a former security executive in the electric sector, Harrell joined DHS in December 2018. He has helped organize cybersecurity drills for critical infrastructure companies, including the recently completed “Cyber Storm” exercise, which drew 2,000 participants. Harrell also helped run CISA’s security team for the last two Super Bowls.

Starting Monday, CISA Deputy Assistant Director Steve Harris will fill Harrell’s role in an acting capacity, an agency spokesperson said.

In his previous role as a security executive at Duke Energy, a utility with some 8 million customers, Harrell oversaw penetration tests of the company’s networks and responded to security incidents.

Harrell’s departure follows that of Grant Schneider, the former federal chief information security officer, who announced this week he was also leaving the Trump administration for the private sector.

This is a developing story. It will be updated when more information becomes available.

The post CISA infrastructure security official Brian Harrell steps down appeared first on CyberScoop.


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more