Gartner Expert

Pete Shoard

VP Analyst

Pete Shoard is part of the Cybersecurity Threat Detection & Response team. Covering analysis in the areas surrounding Security Operations Centers (SOC) including: best practices for building measuring and managing SOC teams, techniques and processes involving the identification of the attack surface, threat exposure, and the detection and response to ongoing cyber threats. As well as the acquisition and scoping of services to augment SOC teams such as Managed Detection and Response (MDR).

Previous experience

Mr. Shoard was responsible for the oversight and vision surrounding the development and enhancement of BT's Managed Security Services Platform. He supported BT's service and product strategy through the use of big data, automation and orchestration technologies. Before BT Group, he was Head of Product Development for SecureData Europe. There he was responsible for the development and integration of the vulnerability identification, threat detection and threat defense products and services offered as part of SecureData GI. He has experience of working within operational security environments while at BAE Systems Detica (now BAE Applied Intelligence) and developing advanced behavioral analytics for the detection of state-led attacks against international commercial and defense-related organizations. Mr. Shoard served 9 years operationally in the Royal Air Force, having previously held security clearance, working in national defense and Radar/Tactical Datalink-based systems.

Professional background

BAE Systems Detica, Managed Security Threat Detection Lead, 3 years

BT Security, Chief Architect - Capability, 1 years

SecureData, Head of Product Development, 2 years

Areas of coverage
  • Security Operations

  • Cybersecurity Leadership

  • Build and Optimize Cybersecurity Programs

  • Meet Daily Cybersecurity Needs

Read More Read Less

Top Issues That I Help Clients Address

01

Aiding selection and acqusition of the most effective MDR

02

Defining security operations centre strategy

03

Identifying appropriate security detection use cases

04

Setting best practice for security operations processes and staffing

05

Identifying and managing threat exposure