Pete Shoard
Pete Shoard, head of product development, SecureData
Pete Shoard is responsible for the development of the portfolio of products and services offered as part of SecureData GI, the company’s flagship cloud solution. Pete is responsible for the design and implementation of threat detection and defence mechanisms and oversees the development of detection methodologies, reporting measures and response procedures.
With over 12 years’ experience in security, he has an extensive knowledge of the threat landscape, which he has gained combating cyber attacks for some of the world’s most targeted firms. Pete specialises in harnessing the power of front-line technical data solutions like SIEM and big data platforms to deliver actionable threat intelligence. He has previously led both development and analyst teams for Deloitte UK, BAE Systems and the Royal Air Force.
Stay connected:
Featured Stories:
cybersecurity
Strategy and anticipation are key to securing against cyber threats
With technological progress comes increased security risks. Sophisticated and co-ordinated cyber groups are working every day to find potential entry points into organisations’ networks.
Business
Raising talent attraction and retention with IT investment
To be at the centre of talent attraction and retention, businesses should make use of workplace technology that enables them to integrate collaborative, secure and sustainable measures into their operations.
Cloud Computing
How NIST started the countdown on the long journey to quantum safety
Leading the charge to develop a post-quantum cryptographic standard for organisations is the US government’s National Institute of Standards and Technology (NIST).
Cloud
Overcoming economic uncertainty with cloud flexibility
Particularly for companies that jumped into the cloud headfirst, taking the time to optimise existing processes is a remarkable way to reduce infrastructure costs and free up OPEX for delivering business value.
Big Data
Ahead in the Cloud: harnessing the power of Threat Intelligence
Cybercriminals are experts at finding the chinks in your organisation’s armour. For most businesses, the weak points lie in the grey spaces between security...
Subscribe
Popular articles
cybersecurity
Strategy and anticipation are key to securing against cyber threats
With technological progress comes increased security risks. Sophisticated and co-ordinated cyber groups are working every day to find potential entry points into organisations’ networks.
Business
Raising talent attraction and retention with IT investment
To be at the centre of talent attraction and retention, businesses should make use of workplace technology that enables them to integrate collaborative, secure and sustainable measures into their operations.
Cloud Computing
How NIST started the countdown on the long journey to quantum safety
Leading the charge to develop a post-quantum cryptographic standard for organisations is the US government’s National Institute of Standards and Technology (NIST).
Cloud
Overcoming economic uncertainty with cloud flexibility
Particularly for companies that jumped into the cloud headfirst, taking the time to optimise existing processes is a remarkable way to reduce infrastructure costs and free up OPEX for delivering business value.
Business
“The need for speed” – Finding a way to unlock agility for today’s businesses
To fully support agility, the solutions chosen will need to enshrine all the latest innovations in areas like artificial intelligence, machine learning or prescriptive analytics.