Gartner Blog Network

Pete Shoard
Sr Director Analyst I
3 years at Gartner
17 years IT Industry

Pete Shoard is part of the Security Operations team. Covering analysis of and selection criteria for threat detection and response Managed Security Services (MSS) such as Managed Detection and Response (MDR) and Vulnerability Management (VM) services. Also security detection and response technologies such as Security Information and Event Management (SIEM), User Entity Behavioral Analytics (UEBA) and Deception. Supporting Gartner's ITL research in wider areas such as Security Operation Centre (SOC) best practice and security metrics and measurement.Read Full Bio

Presenting Security Metrics to the Board

by Pete Shoard  |  May 18, 2020

One of the key challenges organisations face when looking to commission security projects is the prospect of having to justify the large spend to the board.

Read more »

Get the Foundational Elements Right When Selecting a Detection and Response Service Provider

by Pete Shoard  |  April 20, 2020

I recently completed the third update on my Foundational Managed Security Services (MSS) note: Get the Foundational Elements Right When Selecting a Detection and Response Service Provider. This was the first piece of research i published when i joined Gartner back in 2018 and provides a guidance framework for organisations looking to outsource security operations. […]

Read more »

The Managed Security Services Landscape Is Changing

by Pete Shoard  |  April 14, 2020

In late 2019 we began the process of formally shifting what our alignment to Managed Security Services (MSS) would be going forward. After seeing a vast number of changes over the past 3 years, both from consumers and vendors. As well as the introduction of large numbers of Detection and Response focused providers, it was […]

Read more »

What Actually is Threat Hunting?

by Pete Shoard  |  April 8, 2020

Traditionally my inquiry calls at Gartner, centre around Detection and Response Services. How to find bad stuff, who is good at reporting and responding bad stuff and so on. But more recently the topic of threat hunting keeps coming up. With differences of opinion, not only from client and vendors but also amongst the analyst […]

Read more »

Temporary Policy Changes for Remote Working

by Pete Shoard  |  March 30, 2020

Many of us are moving quickly to implement/extend remote working technologies in response to the current situation. At a time when all this is a necessity, not a choice; even those who had good remote working policies are now having difficulties. But, how can we address some of these difficulties simply and easily? A couple […]

Read more »

How Should We Measure Our SOC?

by Pete Shoard  |  March 22, 2020

There is a growing number of organizations out there, both big and small, that want to make an investment in a Security Operations Centre (SOC). Most organizations don’t really plan for the significant spending and the internal effort involved in doing so properly. Many go ahead and throw money at the problem without carefully thinking […]

Read more »

Is My Remote Workforce Visible to Our Security Operations?

by Pete Shoard  |  March 19, 2020

Over the past few days and weeks, more and more organizations have been asking their employees to work remotely. Many of whom are utilizing remote working systems that have not operationally been tested as part of their core security operations monitoring. For many, this change in the way we all are working will result in […]

Read more »