blog-main.jpg

Inside the Barrel

Blog - Cask

By
As if threat management and incident response don’t already demand enough of your attention, ensuring these security procedures abide by ever-changing regulatory and industry requirements is be...
Continue Reading
Digital business transformation is upon us. As such, there’s no reason the skilled members of your HR team should be wasting time and brain space on manual tasks like updating, distributing, co...
Continue Reading
Just because physical paperwork is going extinct doesn’t mean HR departments will be anytime soon. With workforces becoming more fluid and artificial intelligence promising to change the way we...
Continue Reading
  How do you prioritize projects in the context of organizational constraints? Are you challenged with multiple demand channels, competing priorities and poor understanding of the supply-side r...
Continue Reading
I've mentioned that I'm lazy, and I'm not ashamed of that - in fact, I'm sure there's a joke out there about finding the easiest way to do something, by asking a developer, but I am too lazy to...
Continue Reading
How do you work with business partners to forecast and manage demand?  We see many different challenges in this area, so let’s break this down into levels of maturity to get a better sense of t...
Continue Reading
  How do you manage the complexity of services that span multiple functional teams and technologies while including outside service providers?  The answer is service portfolio management.  When...
Continue Reading
One of the more challenging business problems for IT organizations is how to communicate value to your customers and business partners. Cask finds that services, when properly defined, provide ...
Continue Reading
Does your IT organization struggle to communicate value to your business partners and constituency? Do you know how your services are perceived by users and customers?
Continue Reading
Are disconnected systems and poor communications between security applications and IT causing problems for your security management team? Is resolving security issues taking too long to process...
Continue Reading