Davos Summit met in Switzerland and is due to run until tomorrow to discuss the Fourth Industrial Revolution and the global impact of new technologies.
Technology is constantly evolving and bringing with it new risks that businesses need to be prepared for. Geraldine Osman, VP of International Marketing at Nexsan highlighting how businesses can be prepared in the digital age.
Geraldine Osman, VP of International Marketing at Nexsan:
“The digital age means we now all live in a connected world and constant advances in mobile and cloud technology have opened up a range of new possibilities around the way we work. Users expect to be able to leverage the benefits of technology working from anywhere, anytime. However, these developments also bring new and inherent risks that organisations need to mitigate in order to keep both users and the company safe. As technology evolves so do the risks and companies need to adapt their strategies, infrastructures and policies to cope with these associated risks. Businesses should review their security strategies as a priority and make sure that they future proof their investments in technology as much as possible.”
[su_box title=”About Geraldine Osman” style=”noise” box_color=”#336588″]Geraldine Osman is VP International Marketing at Connected Data. She has over 18 years of technology marketing leadership experience, much of which was gained specialising in storage and security. Geraldine has worked extensively with pioneering technologies to bring them to new markets and geographies, defining go-to-market strategies that deliver fast adoption of next generation technology.
Geraldine joined Connected Data in 2014 and is responsible for all marketing aspects including thought leadership, market category creation, field marketing and strategic pipeline planning. Prior to joining Connected Data, Geraldine worked for Barracuda Networks where she was responsible for establishing the marketing function in EMEA and accelerating regional growth leading in to their successful IPO.[/su_box]
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.