Specific adversary behaviors observed in actual cyber-attacks are analyzed, tracked and collectively comprise technical threat intelligence. This session presents a straightforward process to apply technical threat intelligence to prioritizing threats and closing gaps in cybersecurity controls.