Skip to Main Content

Paul Sems

Managing Director of Remediation Services

EXPERIENCE
Before joining TrustedSec, Paul Sems excelled at leading organizations in technology and executive leadership roles. He is a lifelong hacker with extensive experience assisting a wide range of organizations in meeting technology and security challenges. 

Paul was the senior executive responsible for IT at Vitamix, a manufacturer and marketer of high-end blending products for both the foodservice industry and the consumer market. While at Vitamix, Paul built a world-class IT organization to support a half-billion dollar global enterprise. He initiated and managed the implementation of multiple business solutions that have been the foundation for significant growth and stability within the organization. Under his leadership, the organization selected, implemented, and supported solutions that proved to be a significant business enabler, supporting the massive growth that Vitamix experienced during his 10-year tenure.

At TrustedSec, Paul built and currently leads the Remediation Services team, which focuses on hardening environments before security incidents happen and helping firms remediate issues after a real or simulated breach. The team is focused on providing pragmatic solutions that improve clients' security postures.

EDUCATION & CERTIFICATIONS
Throughout this career, Paul has held other roles, including business owner, CTO, COO, network engineer, and product development engineer. He received a Master of Business Administration degree from Case Western Reserve University and a Bachelor of Science degree in Computer Science from The University of Akron. He is an inventor of U.S. Patent US20160220973A1.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Webinars February 15 2023

Securing Cloud Native Applications With DevSecOps

Discover DevSecOps solutions for securing cloud-native applications, learn from experts Paul Sems and Mitch Parish, and elevate your organization's security…

Read about this article
Webinars June 07 2023

Insecure by Default: The Hidden Complexities of Cloud Security

Join experts from our Cloud Security and Hardening teams to gain practical insights for how to enhance your own cloud security posture.

Read about this article
Webinars August 23 2023

A More Efficient Attack Path Effectiveness Assessment

Understanding risk assessments with FAIR and threat intelligence is crucial for aligning security risk with real-life threats, leveraging TCAP, Attack…

Read about this article
News September 21 2023

Oklahoma's News 4 - Edmond man receives scary threatening phone call scam

Customize your Linux system with our advanced tools, ensuring maximum security and control.

Read about this article
Webinars January 19 2022

Defending Backups Against Ransomware

Learn how to defend backups against ransomware, a unique threat targeting backup systems, and discover hands-on best practices to harden your backup…

Read about this article
Blog May 20 2025

Red Team Gold: Extracting Credentials from MDT Shares

When it comes to targeting enterprise deployment infrastructure during a Red Team engagement, SCCM (System Center Configuration Manager) tends to get all the…

Read about this article
Blog May 15 2025

Purpling Your Ops

How does one Purple Team? TAC Practice Lead Megan Nilsen shares open-source tools, techniques, and tips for security practitioners exploring Purple Teaming,…

Read about this article
Blog May 08 2025

I Got 99 Problems But a Log Ain’t One

1.1 IntroductionHere at TrustedSec, one of the goals of the Tactical Awareness & Countermeasures (TAC) team is to assess and enhance our partners' security…

Read about this article
Blog May 06 2025

Application Layer Encryption with Web Crypto API

OverviewIn web and mobile applications, we’ve been fortunate over the years to have such widespread use of HTTPS by way of TLS. The proliferation of HTTPS is…

Read about this article
Blog May 01 2025

Why the WAF

In my experience, most organizations are prepared to discuss the scope of penetration tests when preparing for an External or Internal Penetration Test, but…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.