Gartner Information Technology Expert

Pete Shoard

Sr Director Analyst

Pete Shoard is part of the Security Operations team. Covering analysis of and selection criteria for threat detection and response Managed Security Services (MSS) such as Managed Detection and Response (MDR) and Vulnerability Management (VM) services. Also security detection and response technologies such as Security Information and Event Management (SIEM), User Entity Behavioral Analytics (UEBA) and Deception. Supporting Gartner's ITL research in wider areas such as Security Operation Centre (SOC) best practice and security metrics and measurement.

Previous experience

Mr. Shoard was responsible for the oversight and vision surrounding the development and enhancement of BT's Managed Security Services Platform. He supported BT's service and product strategy through the use of big data, automation and orchestration technologies. Before BT Group, he was Head of Product Development for SecureData Europe. There he was responsible for the development and integration of the vulnerability identification, threat detection and threat defense products and services offered as part of SecureData GI. He has experience of working within operational security environments while at BAE Systems Detica (now BAE Applied Intelligence) and developing advanced behavioral analytics for the detection of state-led attacks against international commercial and defense-related organizations. Mr. Shoard served 9 years operationally in the Royal Air Force, having previously held security clearance, working in national defense and Radar/Tactical Datalink-based systems.

Professional background

BT Security

Chief Architect - Capability

SecureData

Head of Product Development

BAE Systems Detica

Managed Security Threat Detection Lead

Areas of coverage

Digital Workplace Infrastructure and Operations

Security and Risk Management Leaders

Security Operations

Infrastructure Security

Read More Read Less

Top Issues That I Help Clients Address

1Aiding selection of the most effective MSSP / MDR

2Defining security monitoring services and technologies strategy

3Identifying appropriate security use cases and detection tools

4Setting best practice for security operations

5Setting requirements for MSS and MDR RFP / SOWs