We intend to assist cyber threat intelligence teams in the development of proper intelligence requirements. The following outlines measures needed to effectively define intelligence requirements, determine nation-state and adversary/threat actor intent and capabilities, reviewing corporate ‘crown jewel’ information provided by other groups, combined with pertinent taxonomy and sample matrices. We hope this assists in your efforts to mature your intelligence program.