
CRN Women on the Rise list includes a familiar name

The women that receive this recognition are putting partners front and center, demonstrating strong business acumen, and collaborating with colleagues to drive success. These women will inspire this generation and ones to come to pursue their career goals and make their mark in this thriving industry.
As a Partner Marketing Specialist, Kirsten enables Barracuda’s MSP partners to drive growth using the company’s security solutions and innovative marketing strategies and tools. Making significant strides in the channel space, one of her key accomplishments last year included implementing automation and operational efficiencies that were pivotal to the growth and scalability of the Barracuda MSP Partner Program.
Innovating for success
From creating new tools and resources to introducing and co-hosting a webinar series, Kisten and her teammates aimed to bundle assets that are useful for MSP partners to recruit and expand their business. Their goal is to deliver best-in-class content while providing enticing call-to-actions that can deliver tangible leads for MSPs.
Over the past year, there has been a renewed desire for in-person events. Kirsten has created an easy-to-deploy process with a set of engagement materials to ensure partners have successful results during and after these in-person events.
Kirsten exemplifies the spirit of innovation and collaboration. Her tenacious focus on building relationships, delivering operational efficiency, and creating strategic marketing assets sets a high bar for success. As we look ahead, Kirsten’s insights and contributions will undoubtedly continue to shape both the experience and the growth trajectory of the partners she engages.

The Ransomware Insights Report 2025
Risultati chiave sull'esperienza e l'impatto del ransomware sulle organizzazioni a livello mondiale
Iscriviti al blog di Barracuda.
Iscriviti per ricevere i Threat Spotlight, commenti del settore e altro ancora.

Sicurezza della vulnerabilità gestita: correzione più rapida, meno rischi, conformità più semplice
Scopri quanto può essere facile individuare le vulnerabilità che i criminali informatici vogliono sfruttare