Utilize threat intelligence to support organizational security in a given scenario, using frameworks, threat research, intelligence sharing, and threat modeling methodologies.
Examples: MITRE ATT&CK, Diamond Model, kill chain, indicator of compromise, Common Vulnerability Scoring System, total attack surface, attack vector, adversary capability