Discuss the following:
Define Threat Intelligence
Strategies to identify adversaries who may or may not have breached company’s network
Methods to efficiently leverage your threat intelligence data