Pete Shoard is part of the Security Operations team. Covering analysis in the areas surrounding Security Operations Centers (SOC) including: best practice measurement and management of internal SOC teams, the identification of the attack surface and threat exposure, SOC tools used to deliver threat detection, investigation and response (TDIR) capabilities and the identification, the acquisition and scoping of operational managed security services to augment SOC teams. Primary markets covered include: Security Information and Event Management (SIEM), Security Orchestration Automation and Response (SOAR), Managed Detection and Response (MDR), and Breach and attack simulation (BAS).
Mr. Shoard was responsible for the oversight and vision surrounding the development and enhancement of BT's Managed Security Services Platform. He supported BT's service and product strategy through the use of big data, automation and orchestration technologies. Before BT Group, he was Head of Product Development for SecureData Europe. There he was responsible for the development and integration of the vulnerability identification, threat detection and threat defense products and services offered as part of SecureData GI. He has experience of working within operational security environments while at BAE Systems Detica (now BAE Applied Intelligence) and developing advanced behavioral analytics for the detection of state-led attacks against international commercial and defense-related organizations. Mr. Shoard served 9 years operationally in the Royal Air Force, having previously held security clearance, working in national defense and Radar/Tactical Datalink-based systems.
BT Security
Chief Architect - Capability
SecureData
Head of Product Development
BAE Systems Detica
Managed Security Threat Detection Lead
Security Operations
Cybersecurity Leadership
Build and Optimize Cybersecurity Programs
Meet Daily Cybersecurity Needs
1Aiding selection and acqusition of the most effective MDR
2Defining security operations centre and technologies strategy
3Identifying appropriate security use cases and detection tools
4Setting best practice for security operations processes and staffing
5Tools for identifying and managing threat exposure