Cyber threat intelligence is one of the keys to unlocking potential attacks by state-sponsored attackers and criminals alike. If you understand how, where and why an attacker will try and breach your network, you can build defenses that identify and shut down the attacks quickly. The question becomes how do you obtain the requisite intelligence you need. What, for example, can the deep web and other outside intelligence troves tell us about emerging threats? What policies, procedures and processes can enterprises employ today to improve the analysis of data they already have in their log files, SIEMs and beyond? Here, for your consideration, are some thoughts on how to improve and expand your threat intelligence operations.