The Forrester Wave™: Google named a Leader in Cybersecurity Incident Response Services, Q2 2024

Google Threat Intelligence News and Alerts

Get the latest cyber threat news, alerts and insights delivered to your inbox - Sign up now!
The Oitavos, Cascais, Portugal

Google Cloud CISO Community, Málaga

Join Google Cloud Security Leadership in Málaga for a two-day executive event featuring sessions from Google, Industry Partners and your peers.

Museo Automovilístico de Málaga, Spain

days

hours

minutes

H1 60 characters et ipsum dolor sit amet phaerta et purus

H1 60 characters et ipsum dolor sit amet phaerta et purus

H1 60 characters et ipsum dolor sit amet phaerta et purus

180 characters lorem ipsum dolor sit amet, consectetur adipiscing elit. Mauris id auctor erat. Mauris cursus pharetra purus, et blandit magna condimentum et felis.

Event countdown timer

days

hours

minutes

We are pleased to announce that Google was named a Leader in the 2024 Forrester Wave for Cybersecurity Incident Response Services. Mandiant, part of Google Cloud, designs and delivers services before, during, and after an incident.

Mandiant received the highest possible score in 17 out of the overall 25 predefined criteria areas.

We provide clients with rapid and effective detection, response, remediation, and long-term transformation services - and the scale of Google Cloud enables us to broaden our scope, increase our speed, extend our reach, and enhance our capabilities.

Finding the right incident response (IR) services partner is a key component for organizations to achieve cybersecurity resilience.

Read Forrester’s report to learn about:

  • What critical characteristics to look for in an IR services partner
  • A comparison of the 14 most significant IR services vendors
  • Why Google was named a Leader in this year’s evaluation

120 characters autem quibusdam et autae officiis debitis aut rerum necessitatibus saepe eveniet voluptates repudiandae sint.

—Firstname Lastname, Title lorem ipsum dolor set amet

Security and risk leaders needing a provider fluent in technical, executive, regional, and regulatory communication that is on the front lines against complex adversaries and at the leading edge of threat intelligence, should look to Google," said Forrester in the report.



*Disclaimer: The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave™ are trademarks of Forrester Research, Inc. The Forrester Wave™ is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on the best available resources. Opinions reflect judgment at the time and are subject to change.
icon-quote

OPTIONAL EYEBROW

H2 50 characters lorem eusa qui dolor sit elis amet

180 characters autem quibusdam et officii debitis rerum necessitatibus saepe eveniet quibusdam et officiis quibusdam et officii debitis rerum necessitatibus saepe eveniet quibusdam et officiis

Link text

H2 50 characters lorem eusa qui dolor sit elis amet

OPTIONAL EYEBROW

H3 28 characters lorem ipsum

105 characters autem quibusdam et officii debitis rerum necessitatibus saepe eveniet quibusdam et officiis

Link text

OPTIONAL EYEBROW

H3 28 characters lorem ipsum

105 characters autem quibusdam et

Link text

OPTIONAL EYEBROW

H3 28 characters lorem ipsum

105 characters autem quibusdam et officii debitis rerum necessitatibus saepe eveniet quibusdam et officiis

Link text

H2 50 characters lorem eusa ipsum dolor sit elis amet

H3 28 characters lorem ipsum

Date XX, XXXX [SH-M]

Tracks available:

H3 28 characters lorem ipsum

Date XX, XXXX [SH-M]

Tracks available:

H3 28 characters lorem ipsum

Date XX, XXXX [SH-M]

Tracks available:

H3 28 characters lorem ipsum

Date XX, XXXX [SH-M]

Tracks available:

H2 50 characters lorem eusa ipsum dolor sit elis amet


H3 28 characters lorem ipsum

Date XX, XXXX [SH-M]

Tracks available:


H3 28 characters lorem ipsum

Date XX, XXXX [SH-M]

Tracks available:


H3 28 characters lorem ipsum

Date XX, XXXX [SH-M]

Tracks available:


H3 28 characters lorem ipsum

Date XX, XXXX [SH-M]

Tracks available:


H3 28 characters lorem ipsum

Date XX, XXXX [SH-M]

Tracks available:

H2 50 characters lorem eusa ipsum dolor sit elis amet

countries

Country one

Country two

Country three

Country four ~ without images

icon-expand-all

Multi-city map

Event map and details

,
,

Speakers

Phil Venables

VP, CISO

Google Cloud

Firstname Lastname

Customer Engineer,

Google Cloud

Firstname Lastname

Customer Engineer,

Google Cloud

Firstname Lastname

Customer Engineer,

Google Cloud

Firstname Lastname

Customer Engineer,

Google Cloud

Firstname Lastname

Customer Engineer,

Google Cloud

Firstname Lastname

Customer Engineer,

Google Cloud

Firstname Lastname

Customer Engineer,

Google Cloud

Firstname Lastname

Customer Engineer,

Google Cloud

Firstname Lastname

Customer Engineer,

Google Cloud

Firstname Lastname

Customer Engineer,

Google Cloud

Firstname Lastname

Customer Engineer,

Google Cloud

Firstname Lastname

Customer Engineer,

Google Cloud

Firstname Lastname

Customer Engineer,

Google Cloud

Firstname Lastname

Customer Engineer,

Google Cloud

Firstname Lastname

Customer Engineer,

Google Cloud

Firstname Lastname

Customer Engineer,

Google Cloud

Firstname Lastname

Customer Engineer,

Google Cloud

Firstname Lastname

Customer Engineer,

Google Cloud

Firstname Lastname

Customer Engineer,

Google Cloud

AGENDA

Day 1: Arrivals and Welcome Reception

  • 15:30 - 16:30
    Networking
  • 16:30 - 16:45
    Welcome
  • 16:45 - 17:45
    The Culture of Industrialization, including Panel Discussion
  • 17:45 - 17:55
    Close
  • 19:30 - Late
    Welcome Dinner

Day 2: Sessions and Networking

  • 08:30 - 09:00
    Arrival with Tea and Coffee
  • 09:10 - 09:20
    Welcome
  • 09:20 - 10:00
    Keynote Discussion with Phil Venables
  • 10:00 - 10:50
    Industrialising Threat Intelligence
  • 10:50 - 11:05
    Break
  • 11:05 - 12:30
    What will AI mean to you, with Breakout Discussion Groups
  • 12:30 - 13:30
    Lunch
  • 13:30 - 13:40
    Playback AI Discussion Groups
  • 13:40 - 14:00
    Secrets of Chrome Browser to Secure Enterprise Browsing Starts with Chrome
  • 14:00 - 14:35
    Security, Privacy and Resilience SRE: Delivering Security at Scale
  • 14:35 - 14:50
    Break
  • 14:50 - 15:30
    Cloud Resilience with Panel Discussion
  • 15:30 - 16:20
    Knowing at Scale
  • 16:20 - 16:30
    Close
  • 16:30 - 19:00
    Optional Activities (on sign up)
  • 20:00
    Cocktail Dinner

Day 3: Community Event

  • 09:00 - 12 noon
    • 1: 1 meetings
    • Topic deep dive surgeries
    • Threat intel briefings (on sign up)
    • Feedback discussion groups

Agenda subject to change

icon-expand-all

Agenda

Tuesday 09 May

  • 15:30 - 16:30
    Networking
  • 16:30 - 16:45
    Welcome
  • 16:45 - 17:45
    The Culture of Industrialization, including Panel Discussion
  • 17:45 - 17:55
    Close
  • 19:30 - Late
    Dinner


Wednesday 10 May

  • 08:30 - 09:00
    Arrival with Tea and Coffee
  • 09:10 - 09:20
    Welcome
  • 09:20 - 10:00
    Keynote Discussion with Phil Venables
  • 10:00 - 10:50
    Industrialising Threat Intelligence
  • 10:50 - 11:05
    Break
  • 11:05 - 12:30
    What will AI mean to you, with Breakout Discussion Groups
  • 12:30 - 13:30
    Lunch
  • 13:30 - 13:40
    Playback AI Discussion Groups
  • 13:40 - 14:00
    Secrets in Chrome Browser
  • 14:00 - 14:35
    Security, Privacy and Resilience SRE: Delivering Security at Scale
  • 14:35 - 14:50
    Break
  • 14:50 - 15:30
    Cloud Resilience with Panel Discussion
  • 15:30 - 15:50
    Knowing at Scale
  • 15:50 - 16:20
    Cybersecurity Risk: The Board of Directors’ Point of View
  • 16:20 - 16:30
    Close
  • 16:30 - 19:00
    Optional Activities (on sign up)
  • 20:00
    Cocktail Dinner


Thursday 11 May Community Event

  • 09:00 - 12 noon
    • 1: 1 meetings
    • Topic deep dive surgeries
    • Threat intel briefings (on sign up)
    • Feedback discussion groups

Track 1

Track 2

Track 3

  • 15:30 - 16:30
    Networking
  • 16:30 - 16:45
    Welcome
  • 16:45 - 17:45
    The Culture of Industrialization, including Panel Discussion
  • 17:45 - 17:55
    Close
  • 19:30 - Late
    Dinner
  • 08:30 - 09:00
    Arrival with Tea and Coffee
  • 09:10 - 09:20
    Welcome
  • 09:20 - 10:00
    Keynote Discussion with Phil Venables
  • 10:00 - 10:50
    Industrialising Threat Intelligence
  • 10:50 - 11:05
    Break
  • 11:05 - 12:30
    What will AI mean to you, with Breakout Discussion Groups
  • 12:30 - 13:30
    Lunch
  • 13:30 - 13:40
    Playback AI Discussion Groups
  • 13:40 - 14:00
    Secrets in Chrome Browser
  • 14:00 - 14:35
    Security, Privacy and Resilience SRE: Delivering Security at Scale
  • 14:35 - 14:50
    Break
  • 14:50 - 15:30
    Cloud Resilience with Panel Discussion
  • 15:30 - 15:50
    Knowing at Scale
  • 15:50 - 16:20
    Cybersecurity Risk: The Board of Directors’ Point of View
  • 16:20 - 16:30
    Close
  • 16:30 - 19:00
    Optional Activities (on sign up)
  • 20:00
    Cocktail Dinner

Agenda

Track 1

Track 2

  • 8:30 AM–09:30 AM
    Registrations
    Registrations
  • 9:30 AM–09:40 AM
    Opening Keynote: Lorem ipsum dolor sit
    Firstname Lastname, Position, Company XYZ
    Opening Keynote: Lorem ipsum dolor sit
    Firstname Lastname, Position, Company XYZ
  • 9:40 AM–10:00 AM
    Pushing the limits of BigQuery with Kabam
    Firstname Lastname, Position, Company XYZ
    Pushing the limits of BigQuery with Kabam
    Firstname Lastname, Position, Company XYZ

Our partners

Platinum

Partner
Partner
Partner
Partner
Partner
Partner
Partner

Silver

Partner
Partner
Partner
Partner

Three-promo module. 40 characters max = two lines max on mobile.

h3 headline 30 characters max

Donec rutrum congue leo eget malu suada. Praesent sapien massa, creallis sollicitudin malesuada euse consecturuer.

h3 headline 30 characters max

Donec rutrum congue leo eget malu suada. Praesent sapien massa, creallis sollicitudin malesuada euse consecturuer.

h3 headline 30 characters max

Donec rutrum congue leo eget malu suada. Praesent sapien massa, creallis sollicitudin malesuada euse consecturuer.

Two-promo module. 40 characters max = two lines max on mobile.

h3 headline 30 characters max

Donec rutrum congue leo eget malu suada. Praesent sapien massa, creallis sollicitudin malesuada euse consecturuer.

h3 headline 30 characters max

Donec rutrum congue leo eget malu suada. Praesent sapien massa, creallis sollicitudin malesuada euse consecturuer.

One-promo module. 40 characters max = two lines max on mobile.

h3 headline 30 characters max

Donec rutrum congue leo eget malu suada. Praesent sapien massa, creallis sollicitudin malesuada euse consecturuer.

Subscribe Now

Read the report

We hope you find The Forrester Wave™: Cybersecurity Incident Response Services, Q2 2024 report valuable.

After you read the report, browse Mandiant Incident Response Services.


We’re so glad you want to join us at The Forrester Wave™: Cybersecurity Incident Response Services, Q2 2024. We will follow up shortly with the update on your registration status.

Follow us
"); // create button that is not included when there is more speakers let speakerBtn = document.createElement("button"); // don't add btn if card is disabled if (!$(this).hasClass('isDisabled')) { let speakerCompany = $(this).find('.speaker-company'); $(speakerBtn) .attr("class", "speakerBtn low-em") .text("Learn More") .insertAfter(speakerCompany); } }) } // add special formatting when there are two speakers or less if (count == 2) { format(); } else if (count == 1) { format(); $(".speaker").css("grid-column", "1 / span 2"); } else { $("#speakers").removeClass("formatSpeakers"); } } if (!/lpeditor/.test(location.href)) { formatSpeakers(); }