Pennsylvania’s Chief Information Officer Brenda Orth will resign, effective October 31, according to an announcement made today.
The commonwealth’s chief technology officer, Tony Encinias, will serve as interim chief information officer while retaining his current position.
Brenda Orth was appointed in January 2008. She previously served as chief technology officer for the commonwealth.
“As the commonwealth’s chief information officer, Brenda Orth has focused on providing world-class IT solutions to state agencies that deliver services to more than 12 million Pennsylvanians,” said Soura. “Her leadership has enabled us to confront extraordinary budget pressures in a responsible fashion – by identifying and advancing our strategic priorities, and by taking an enterprise-wide approach to sharing personnel and infrastructure.”
The Office of Administration’s Office for Information Technology is responsible for leading and coordinating information technology services in the commonwealth, as well as overseeing technology policies, standards, architecture and solutions to enhance system interoperability, data security and cost-effectiveness of state agencies under the Governor’s jurisdiction.
In March of this year, Pennsylvania’s CISO, Robert Maley was fired from his job after speaking about security incidents involving the state without proper authorization during a panel discussion at the RSA conference.
< Be Informed. Subscribe to the SecurityWeek Email Briefing Here >

More from SecurityWeek News
- Threat Hunting Summit Virtual Event NOW LIVE
- Video: ESG – CISO’s Guide to an Emerging Risk Cornerstone
- Threat Modeling Firm IriusRisk Raises $29 Million
- SentinelOne Announces $100 Million Venture Fund
- Today: 2022 CISO Forum Virtual Event
- Cymulate Closes $70M Series D Funding Round
- SecurityWeek to Host CISO Forum Virtually September 13-14, 2022: Registration is Open
- Privilege Escalation Flaw Haunts VMware Tools
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
