Meet Our Team
ICASI member companies are committed to contributing their resources and expertise to advancing security on the Internet. The ICASI leadership team includes several industry thought leaders from its various member organizations.
Russell Smoak ‒ Cisco Systems
A 15-year veteran of Cisco Systems, Russ Smoak is Director/GM of Security Research and Operations at the company where he is responsible for multiple security programs focused on product vulnerability disclosure, intrusion prevention system signature development, as well as security vulnerability research. Earlier, Smoak successfully served in engineering, customer advocacy, and sales positions.
Smoak and his team collaborate globally across all business functions within Cisco to ensure delivery of timely and actionable security-focused content to Cisco customers and partners through several portals, including the Cisco Security IntelliShield Alert Manager Service and the Cisco Security Center.
Smoak and his team are also active participants in the security community, and share their knowledge and expertise at many industry forums, conferences, and events.
"Over the last several years, we have seen examples of collaboration on both sides of the security equation. Our industry has rallied together to address challenges presented by vulnerabilities and malicious activity while, at the same time, our adversaries have matured their operations and increased the potency of the threats they introduce into the wild. Although our industry has certainly learned to respond, if we are going to change the security landscape in our favor it's important that we evolve our ability to collaborate in order to move from transactional response to proactive defense. ICASI clearly demonstrates the willingness of technology vendors to provide a collaborative response to challenges facing the Internet ecosystem." — Russell Smoak, Director/GM of Security Research & Operations, Cisco
Perry Olson ‒ Intel
Perry Olson brings years of IT and security management experience to his current role as Manager of Intel’s IT Information Risk and Security Management organization. He and his team are responsible for a broad range of Intel’s information security-related programs, including technical risk and controls analysis, training and awareness, and security policy formulation and guidance.
Most recently, Olson led Intel’s Enterprise Information Security Operations (EISO) team that is responsible for all operational security functions for Intel IT. The EISO team represents the front line of the information security perimeter in securing Intel’s global computing environment .
Olson has been with Intel since 1987. Earlier roles at the company included positions of increasing responsibility in finance, materials, product planning, and mergers and acquisitions.
He earned a B.S. degree in finance from Utah State University.
"The rapidly changing threat landscape and interconnected nature of the global digital infrastructure highlights the need for increased industry coordination to respond to these challenges. ICASI provides a trusted forum for dialogue within the global vendor community to proactively respond to threats and foster incident response best practices. Intel’s active participation in ICASI highlights our commitment to the security of the global digital infrastructure, and an agile response to security events globally." — Perry Olson, Manager, Information Risk & Security Management Group, Intel
Alan Mitchell ‒ IBM
Alan Mitchell has been with IBM for more than 17 years, and currently serves as Senior Manager responsible for IBM’s global Computer Security Incident Response Team (CSIRT). He and his team manage and direct IBM’s cyber security incident response, as well as drive the strategy, tools, and processes related to it. Mitchell also has an extensive background in law enforcement and criminal investigations.
He holds a Bachelor of Science degree in Computer Information Systems from the University of Phoenix. Additionally, Mitchell is a Certified Information Systems Security Professional (CISSP) and holds multiple industry and government certifications.
"It is important for IBM to collaborate with some of the top technology companies to try to increase the security protections for both IBM's clients and ourselves internally. IBM takes this responsibility seriously and, as a Founding Member of ICASI, continues to support the mission and goals of the consortium." — Alan Mitchell, Senior Manager, CSIRT, IBM
Kimmo Puranen ‒ Nokia
With more than 20 years of experience leading, innovating, developing, and building the latest in mobile Internet technology, Kimmo Puranen is Senior Product Security Technology Manager of the Product Security team in the office of the CTO at Nokia. He is focused on technology management, systems and software architectures, Internet services, security and privacy, and numerous software and systems development programs. Puranen has also held several product program management, security systems, and software architecture management roles within Nokia since joining the company in 2002.
Previously, Puranen was CTO of Patria Ailon Oy and CTO of Wireless Network Services, where he led the R&D, technology road mapping, industry collaboration, and business development teams of those wireless, datacom-focused companies. Prior to that, Puranen was Network Development/R&D Manager of Jippii Group where he was responsible for both business and product development. Earlier, Puranen was a co-founder of Scifi Communications, the first independent ISP in Finland. He also worked with aerospace and military communications projects in Insta Oy/Special Systems Division as Project Specialist, and as Design Engineer for wireless radio networks, hard real-time systems, DSP, network, and data security.
Puranen has a Masters degree in Software Engineering, Computer Networks, and Computer Technology from Tampere University of Technology, and also worked at the University as researcher, project manager, and research assistant.
"For many, the mobile phone is an essential part of our everyday life. The next transformation will come when the mobile phone provides truly personalized and useful services that help you get the most out of life. For Nokia, security is an essential part of all phases of the mobile communications development process. Mobile security places various requirements globally on networks, platforms, servers, hardware, software, systems, and procedures. Nokia is fully committed to continuously develop its products and services." — Kimmo Puranen, Senior Product Security Technology Manager, Nokia
Mike Reavey ‒ Microsoft
Mike Reavey is the Director of the Microsoft Security Response Center (MSRC) in the Trustworthy Computing Group. In this role, he leads Microsoft Corp.'s security response team in detecting and addressing software vulnerabilities in the company's products. Additionally, Reavey engages with cross-Microsoft product groups and the external researcher community to proactively identify security threats and help keep customers protected.
Reavey has worked with the MSRC since 2003, continually aiming to improve the team's response framework. Most notably, he was very involved in resolving the Zotob, Sasser, and Blaster virus outbreaks.
Prior to joining Microsoft, Reavey was a team leader for the Air Force Communications Agency and the 92nd Information Warfare Squadron in the U.S. Air Force. In this role, he worked to secure and optimize global Air Force networks.
"Microsoft understands that improving the security of the Internet is not something any one individual, company, or technology can do alone. Several important threats in the recent years have been resolved with multi-vendor collaboration, and these collective responses will be crucial in handling emerging threats. ICASI is a great step forward in ensuring the industry can work together to solve these challenges, and to keep advancing security on the Internet. It’s another example of Microsoft’s and the industry’s commitment to community-based defense." — Mike Reavey, Director, Microsoft Security Response Center, Trustworthy Computing Group, Microsoft