This presentation provides a milestone approach packed with do's and dont's on how to properly build, implement, manage and leverage a threat intelligence program. If you think threat intelligence is a function of information security, or defending against malware, a feed, or something you buy then you should review this slide deck carefully. These were updated and presented at the Infosec Summit 2019 in Columbus, Ohio.