{"id":57713,"date":"2024-11-20T15:39:02","date_gmt":"2024-11-20T15:39:02","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/36620\/CISA-Director-Jen-Easterly-To-Step-Down-Jan.-20.html"},"modified":"2024-11-20T15:39:02","modified_gmt":"2024-11-20T15:39:02","slug":"cisa-director-jen-easterly-to-step-down-jan-20","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cisa-director-jen-easterly-to-step-down-jan-20\/","title":{"rendered":"CISA Director Jen Easterly To Step Down Jan. 20"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.cyberriskalliance.com\/wp-content\/uploads\/2022\/06\/060822_jen_easterly_cisa.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly will resign on Inauguration Day, Jan. 20, 2025, the agency confirmed this week.<\/p>\n<p>Easterly will be stepping down along with all other CISA staff appointed by President Joe Biden, including Deputy Director Nitin Natarajan, as former President and now-President Elect Donald Trump is sworn in a second time.<\/p>\n<p>The agency\u2019s second director since it was established in 2018, Easterly was appointed in July 2021 after first CISA Director Chris Krebs was fired by Trump on Nov. 17, 2020, for rejecting the then-president\u2019s claims of election fraud.<\/p>\n<p>Easterly previously served in the U.S. Army for 20 years and helped establish the United States Cyber Command (USCYBERCOM) in 2009. She also served as National Security Agency (NSA) deputy director for counterterrorism from May 2011 to October 2013, and as senior director for counterterrorism on the National Security Council (NSC) from October 2013 to February 2016 before spending four and a half years in the private sector as a cybersecurity leader at Morgan Stanley.<\/p>\n<p>During her time at CISA, Easterly has been known for her championing of strong public-private partnerships between CISA, tech companies and critical infrastructure sectors, including through CISA\u2019s promotion of the Secure by Design initiative and pledge.<\/p>\n<p>\u201cJen Easterly is leaving behind a remarkable legacy at CISA. Her leadership, collaboration with technology vendors, and the Secure by Design Pledge initiative have inspired around 70 software companies to prioritize security,\u201d Dave Brown, head of security and compliance at Andesite, told SC Media.<\/p>\n<p>Easterly also oversaw the establishment of the Known Exploited Vulnerabilities (KEV) catalog in November 2021, responses to major cyber incidents like the May 2021 ransomware attack on Colonial Pipeline and December 2021 exploitation of the Apache Log4j vulnerability, and more recently has helped address the growing need to prepare for quantum computing and artificial intelligence (AI) driven threats and security risks.<\/p>\n<p>In the lead up to the 2024 election, <a href=\"https:\/\/www.scworld.com\/news\/cisa-director-easterly-seeks-to-quell-concerns-about-election-security\" target=\"_blank\" rel=\"noreferrer noopener\">assured the public<\/a> that election infrastructure has \u201cnever been more secure,\u201d while also warning about the risks of foreign influence operations and disinformation campaigns.<\/p>\n<p>\u201cDirector Easterly did an incredible job in the middle of an extremely turbulent period in US cybersecurity history. Her willingness to get out front-and-center and her instincts for \u2018marketing the problem\u2019 have been a core part of driving and improving cybersecurity awareness across a huge variety of domains, ranging from critical infrastructure and the threat posed by nation-states, through to consumer cybersecurity education,\u201d Bugcrowd Founder and Advisor Casey Ellis told SC Media. \u201cShe has consistently been a huge champion of the good-faith hacker community as a part of the solution to cyber resilience.\u201d<\/p>\n<p>Easterly was also lauded as an inspiration for women in the cybersecurity field in several tributes posted on social media in response to the news of her impending resignation.<\/p>\n<p>\u201cJen is someone I so look up to, and who has inspired me to reach for the next level in my cybersecurity career. So appreciative for not only what she has done for security for DHS, but for women in the industry as well. What a phenomenal role model,\u201d LogRhythm Solutions Engineer Gabrielle Hempel <a href=\"https:\/\/x.com\/gabsmashh\/status\/1858575227292200962\" target=\"_blank\" rel=\"noreferrer noopener\">said in a post on X<\/a>.<\/p>\n<h2>What\u2019s next after Easterly\u2019s departure?<\/h2>\n<p>Easterly\u2019s plans after her departure from CISA, as well as who her successor may be, are unclear, although <a href=\"https:\/\/www.politico.com\/news\/2024\/11\/08\/ohios-chief-top-cyber-trump-00188555\" target=\"_blank\" rel=\"noreferrer noopener\">POLITICO has reported<\/a> that Ohio Secretary of State Frank LaRose is a potential candidate, citing sources close to LaRose.<\/p>\n<p>&nbsp;\u201cIt would be difficult to predict how a change in leadership, specifically the departure of such an impactful leader like Easterly, will impact CISA in the near or long term. However, I feel confident that if CISA remains committed to consistent partnership with technology and security software companies, collective efforts to protect U.S. critical infrastructure will continue to move in a positive direction,\u201d said Brown. \u201cCybersecurity is a team sport, and it is imperative for the industry to build trust and transparency in both directions.\u201d<\/p>\n<p>The Department of Homeland Security (DHS), which oversees CISA, will also come under new leadership come 2025, with Trump having nominated South Dakota Gov. Kristi Noem to replace Alejandro Mayorkas as DHS secretary. Additionally, the Senate Homeland Security and Governmental Affairs Committee, which has jurisdiction over CISA, will be helmed by Sen. Rand Paul (R-Ky.) during the next Congress.<\/p>\n<p>Paul has previously accused CISA of censoring conservatives during its efforts to counter online disinformation in the lead-up to the 2020 presidential election, and <a href=\"https:\/\/www.politico.com\/news\/2024\/11\/14\/rand-paul-kneecap-cisa-00189698\" data-type=\"link\" data-id=\"https:\/\/www.politico.com\/news\/2024\/11\/14\/rand-paul-kneecap-cisa-00189698\" target=\"_blank\" rel=\"noreferrer noopener\">told POLITICO<\/a> last week that he would like to eliminate the agency, or \u201cat the very least, eliminate their ability to censor content online.\u201d<\/p>\n<p>However, Paul would need the necessary support from other legislators to drive forward any effort to shutter the agency, which Paul himself admitted was \u201cunlikely.\u201d<\/p>\n<p>Members of the security community say they hope CISA will continue Easterly\u2019s positive work in engaging the private sector to strengthen the nation\u2019s cyber defenses through initiatives like Secure by Design, Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) regulations and the vulnerability reporting requirements of Binding Operational Directive (BOD) 20-01.<\/p>\n<p>\u201cCyber defense is a constantly evolving game of cat-and-mouse, and these initiatives have had a material and measurable impact,\u201d said Ellis.<\/p>\n<p>\u201cIt\u2019s too early to tell, especially with all of the leadership shifts happening at the moment, but I expect that once the cutover takes place the Trump administration will review the core initiatives, potentially add or make a few cuts, and the department will otherwise be left to get back to work,\u201d Ellis added.<\/p>\n<p>Jason Soroko, senior fellow at Sectigo, noted that one of Easterly\u2019s strengths was shifting the perspective on initiatives like Secure by Design, which became \u201ca positive call to arms to do the right thing\u201d rather than a \u201cregulatory burden.\u201d<\/p>\n<p>\u201cCISA should continue its work and look at initiatives to promote more public-private partnerships as well as look at what it can do to promote a strong cybersecurity workforce,\u201d Soroko said.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/36620\/CISA-Director-Jen-Easterly-To-Step-Down-Jan.-20.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":57714,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[372],"class_list":["post-57713","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentusa"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Director Jen Easterly To Step Down Jan. 20 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cisa-director-jen-easterly-to-step-down-jan-20\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Director Jen Easterly To Step Down Jan. 20 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cisa-director-jen-easterly-to-step-down-jan-20\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-20T15:39:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.cyberriskalliance.com\/wp-content\/uploads\/2022\/06\/060822_jen_easterly_cisa.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-director-jen-easterly-to-step-down-jan-20\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-director-jen-easterly-to-step-down-jan-20\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"CISA Director Jen Easterly To Step Down Jan. 20\",\"datePublished\":\"2024-11-20T15:39:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-director-jen-easterly-to-step-down-jan-20\\\/\"},\"wordCount\":986,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-director-jen-easterly-to-step-down-jan-20\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/cisa-director-jen-easterly-to-step-down-jan-20.jpg\",\"keywords\":[\"headline,government,usa\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-director-jen-easterly-to-step-down-jan-20\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-director-jen-easterly-to-step-down-jan-20\\\/\",\"name\":\"CISA Director Jen Easterly To Step Down Jan. 20 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-director-jen-easterly-to-step-down-jan-20\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-director-jen-easterly-to-step-down-jan-20\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/cisa-director-jen-easterly-to-step-down-jan-20.jpg\",\"datePublished\":\"2024-11-20T15:39:02+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-director-jen-easterly-to-step-down-jan-20\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-director-jen-easterly-to-step-down-jan-20\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-director-jen-easterly-to-step-down-jan-20\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/cisa-director-jen-easterly-to-step-down-jan-20.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/cisa-director-jen-easterly-to-step-down-jan-20.jpg\",\"width\":1500,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-director-jen-easterly-to-step-down-jan-20\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,usa\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentusa\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CISA Director Jen Easterly To Step Down Jan. 20\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA Director Jen Easterly To Step Down Jan. 20 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cisa-director-jen-easterly-to-step-down-jan-20\/","og_locale":"en_US","og_type":"article","og_title":"CISA Director Jen Easterly To Step Down Jan. 20 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cisa-director-jen-easterly-to-step-down-jan-20\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-11-20T15:39:02+00:00","og_image":[{"url":"https:\/\/files.cyberriskalliance.com\/wp-content\/uploads\/2022\/06\/060822_jen_easterly_cisa.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cisa-director-jen-easterly-to-step-down-jan-20\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-director-jen-easterly-to-step-down-jan-20\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"CISA Director Jen Easterly To Step Down Jan. 20","datePublished":"2024-11-20T15:39:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-director-jen-easterly-to-step-down-jan-20\/"},"wordCount":986,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-director-jen-easterly-to-step-down-jan-20\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/cisa-director-jen-easterly-to-step-down-jan-20.jpg","keywords":["headline,government,usa"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cisa-director-jen-easterly-to-step-down-jan-20\/","url":"https:\/\/www.threatshub.org\/blog\/cisa-director-jen-easterly-to-step-down-jan-20\/","name":"CISA Director Jen Easterly To Step Down Jan. 20 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-director-jen-easterly-to-step-down-jan-20\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-director-jen-easterly-to-step-down-jan-20\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/cisa-director-jen-easterly-to-step-down-jan-20.jpg","datePublished":"2024-11-20T15:39:02+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-director-jen-easterly-to-step-down-jan-20\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cisa-director-jen-easterly-to-step-down-jan-20\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cisa-director-jen-easterly-to-step-down-jan-20\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/cisa-director-jen-easterly-to-step-down-jan-20.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/cisa-director-jen-easterly-to-step-down-jan-20.jpg","width":1500,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cisa-director-jen-easterly-to-step-down-jan-20\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,usa","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusa\/"},{"@type":"ListItem","position":3,"name":"CISA Director Jen Easterly To Step Down Jan. 20"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57713","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57713"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57713\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/57714"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57713"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57713"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57713"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}