Skip to Main Content

Paul Sems

Managing Director of Remediation Services

EXPERIENCE
Before joining TrustedSec, Paul Sems excelled at leading organizations in technology and executive leadership roles. He is a lifelong hacker with extensive experience assisting a wide range of organizations in meeting technology and security challenges. 

Paul was the senior executive responsible for IT at Vitamix, a manufacturer and marketer of high-end blending products for both the foodservice industry and the consumer market. While at Vitamix, Paul built a world-class IT organization to support a half-billion dollar global enterprise. He initiated and managed the implementation of multiple business solutions that have been the foundation for significant growth and stability within the organization. Under his leadership, the organization selected, implemented, and supported solutions that proved to be a significant business enabler, supporting the massive growth that Vitamix experienced during his 10-year tenure.

At TrustedSec, Paul built and currently leads the Remediation Services team, which focuses on hardening environments before security incidents happen and helping firms remediate issues after a real or simulated breach. The team is focused on providing pragmatic solutions that improve clients' security postures.

EDUCATION & CERTIFICATIONS
Throughout this career, Paul has held other roles, including business owner, CTO, COO, network engineer, and product development engineer. He received a Master of Business Administration degree from Case Western Reserve University and a Bachelor of Science degree in Computer Science from The University of Akron. He is an inventor of U.S. Patent US20160220973A1.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Webinars February 15 2023

Securing Cloud Native Applications With DevSecOps

Join Managing Director of Remediation Services Paul Sems and DevSecOps Security Consultant Mitch Parish as they discuss the challenges and identify solutions…

Read about this article
Webinars June 07 2023

Insecure by Default: The Hidden Complexities of Cloud Security

Join experts from our Cloud Security and Hardening teams to gain practical insights for how to enhance your own cloud security posture.

Read about this article
Webinars August 23 2023

A More Efficient Attack Path Effectiveness Assessment

Join Director of Advisory Innovations Rockie Brockway as he discusses the history of this unique offering and learn about how the evolution of this tool has…

Read about this article
News September 21 2023

Oklahoma's News 4 - Edmond man receives scary threatening phone call scam

Managing Director of Remediation Services Paul Sems spoke to Oklahoma's News 4 about the recent uptick in threatening voice cloning scams and ways you can…

Read about this article
Webinars January 19 2022

Defending Backups Against Ransomware

Join Security Consultant Mike Owens and Remediation Director Paul Sems who will discuss how ransomware attackers are going after backups, identify common…

Read about this article
Blog September 12 2024

Putting Our Hooks Into Windows

We're back with another post about common malware techniques. This time we are talking about setting Windows hooks. This is a simple technique that can be used…

Read about this article
Blog September 03 2024

When on Workstation, Do as the Local Browsers Do!

1    IntroductionWeb browsers are common targets for many different APTs. Tools like Redline Malware or penetration testing tools such as SharpChrome or…

Read about this article
Blog August 29 2024

Gobbling Up Forensic Analysis Data Using Velociraptor

Lately I have been working with Velociraptor for its endpoint and digital forensic capabilities and specifically spent time in many cases in the past two years…

Read about this article
Blog August 22 2024

The Hunter’s Workshop: Mastering the Essentials of Threat Hunting

As an incident unfolds, skilled threat hunters with a special talent for uncovering hidden threats stand at the ready. These hunters smoke jump into the chaos…

Read about this article
Blog August 15 2024

Oops I UDL'd it Again

IntroductionPhishing. We all love phishing. This post is about a new phishing technique based on some legacy knowledge I had that can be used to get past email…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.