Gartner Expert

Pete Shoard

VP Analyst

Pete Shoard is part of the Security Operations team. Covering analysis of and selection criteria for threat detection and response Managed Security Services (MSS), Managed Detection and Response (MDR) and Vulnerability/Exposure Management services. Supporting this with coverage of security detection and response technologies such as Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR) and Deception. Also ITL security research in wider areas such as Security Operation Centre (SOC) best practice and security metrics and measurement.

Previous experience

Mr. Shoard was responsible for the oversight and vision surrounding the development and enhancement of BT's Managed Security Services Platform. He supported BT's service and product strategy through the use of big data, automation and orchestration technologies. Before BT Group, he was Head of Product Development for SecureData Europe. There he was responsible for the development and integration of the vulnerability identification, threat detection and threat defense products and services offered as part of SecureData GI. He has experience of working within operational security environments while at BAE Systems Detica (now BAE Applied Intelligence) and developing advanced behavioral analytics for the detection of state-led attacks against international commercial and defense-related organizations. Mr. Shoard served 9 years operationally in the Royal Air Force, having previously held security clearance, working in national defense and Radar/Tactical Datalink-based systems.

Professional background

BT Security

Chief Architect - Capability


Head of Product Development

BAE Systems Detica

Managed Security Threat Detection Lead

Areas of coverage

I&O Organizational Strategy

Security and Risk Management Leaders

Security Operations

Infrastructure Security

Read More Read Less

Top Issues That I Help Clients Address

1Aiding selection of the most effective MSSP / MDR

2Defining security operations centre and technologies strategy

3Identifying appropriate security use cases and detection tools

4Setting best practice for security operations processes and staffing

5Setting requirements for MSS and MDR RFP / SOWs