Skip to Main Content

Kelsey Segrue

Senior Security Consultant

EXPERIENCE
Kelsey successfully completed internships with TrustedSec and a middle-market accounting and advisory firm.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science in Computer Science from John Carroll University
  • CompTIA Security+

PASSION FOR SECURITY
Kelsey became interested in the Information Security industry at the beginning of her software development education. It was then that she decided she liked breaking things more than she liked making them.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog February 15 2022

Work From Home Productivity Tips

Create a structured schedule with set work hours and breaks to boost productivity while working from home.

Read about this article
Blog September 09 2021

Update: The Defensive Security Strategy

Prevent massive security breaches by protecting your perimeter, employees, and sensitive data with proactive monitoring, secure communication, and robust…

Read about this article
Blog November 19 2020

An Update On Non-Aggressive Reporting

Expertly balancing professionalism and facts, non-aggressive reporting by Kelsey Segrue helps clients understand and respond to security testing findings.

Read about this article
Blog July 30 2020

The Updated Security Pro's Guide to MDM, MAM, and BYOD

Mobile Device Management (MDM) ensures proper protection and central management, but may be intrusive and lock down devices, limiting user experience and…

Read about this article
Blog April 16 2026

Dungeons and Daemons

Play Roll for Initiative. Hack the Planet.Dungeons & Daemons is a cybersecurity RPG that drops you into the boots of a Red Team operator on a live…

Read about this article
Webinars April 15 2026

You Had Us at the First Alert: A Guide to Finding Frequently Missed Detections

Join us for this webinar to get a clearer picture of where your detection coverage has blind spots and a practical roadmap for closing them before a real…

Read about this article
Blog April 14 2026

Benchmarking Self-Hosted LLMs for Offensive Security

We put LLMs to the test—let's find out how good AI is at hacking! We walk through six simple challenges with intentionally naïve setups to test how capable…

Read about this article
Events April 09 2026

TrustedSec Livestream - AMA: Detection Engineering in 2026 and Beyond with John Dwyer

Come prepared with your questions and walk away with actionable knowledge to sharpen your detection capabilities.

Read about this article
Blog April 09 2026

IAM the Captain Now – Hijacking Azure Identity Access

I decided to spend some research time diving in depth into Identity and Access Management (IAM) within Microsoft Azure. I am going to show you within this blog…

Read about this article
Blog April 07 2026

Building a Detection Foundation: Part 5 - Correlation in Practice

From Data Sources to DetectionWe've covered a lot of ground in this series: Windows Security events for logon tracking and process execution; PowerShell…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.