Skip to content
  • Twitter
  • LinkedIn
  • Instagram
  • Facebook
  • Log in
  • Products
    • Cyber Risk Quantification
    • Cyber Risk Benchmarking
    • Third Party Risk Management
    • InsurTech Risk Analysis
  • Platform
    • Platform
    • Cyber Essentials
    • Partner Program
  • About
    • About
    • Customers
    • Blog Archive
  • Resources
    • Resources
    • Blogs & News
    • Customer Case Studies
    • Partnerships
    • Downloads & Videos
    • Glossary
  • Contact Us
    • Contact Us
  • Products
    • Cyber Risk Quantification
    • Cyber Risk Benchmarking
    • Third Party Risk Management
    • InsurTech Risk Analysis
  • Platform
    • Platform
    • Cyber Essentials
    • Partner Program
  • About
    • About
    • Customers
    • Blog Archive
  • Resources
    • Resources
    • Blogs & News
    • Customer Case Studies
    • Partnerships
    • Downloads & Videos
    • Glossary
  • Contact Us
    • Contact Us

Wayne Horkan

185 items

  • Blogs & News

    Cyber-Informed Culture in Multi-Academy Trusts: Bridging Strategy and Operations

    Cybersecurity in education is no longer the sole domain of IT teams or external consultants. In today’s threat landscape, Multi-Academy [...]

    Continue reading
  • Blogs & News

    Why Cyber Due Diligence Now Belongs in the Deal Room

    In 2025, cyber due diligence is no longer a back-office task or post-deal afterthought. It’s a front-line priority for venture [...]

    Continue reading
  • Blogs & News

    Managing Aggregate Risk: Cybersecurity Strategies for Membership Bodies

    Membership bodies — from trade associations to industry consortia — sit in a powerful but precarious position. They are not [...]

    Continue reading
  • Blogs & News

    The Role of Threat Intelligence in Strategic Business Risk

    When most businesses talk about “threat intelligence,” they picture dashboards filled with IP addresses, malware hashes, or dark web chatter. [...]

    Continue reading
  • Blogs & News

    Top 5 Hidden Vulnerabilities in Law Firms — and How to Detect Them Automatically

    From Cyber Tzar – Cyber Risk Intelligence, Built for Law Firms The legal profession is under increasing pressure to demonstrate [...]

    Continue reading
  • Blogs & News

    The Broken Audit: Why Vendor Risk Assessments Fail in the Real World

    For years, vendor risk assessments have followed a predictable formula: questionnaires, spreadsheets, and annual reviews. The logic was simple — [...]

    Continue reading
12Next
  • Products
    • Cyber Risk Quantification
    • Cyber Risk Benchmarking
    • Third Party Risk Management
    • InsurTech Risk Analysis
  • Platform
    • Platform
    • Cyber Essentials
    • Partner Program
  • About
    • About
    • Customers
    • Blog Archive
  • Resources
    • Resources
    • Blogs & News
    • Customer Case Studies
    • Partnerships
    • Downloads & Videos
    • Glossary
  • Contact Us
    • Contact Us

+441216617890

contact@cybertzar.com

+441216617890

contact@cybertzar.com

Terms of Service | Cookie Policy | Privacy Policy

Terms of Service | Cookie Policy | Privacy Policy

2025 | Website designed and built by Tweak Marketing

Page load link

We are using cookies to give you the best experience on our website.

Cyber Tzar
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

Go to Top