This document discusses techniques for intelligence gathering and analysis in cybersecurity. It begins by introducing the cyber kill chain model used to frame attacks. It then discusses how cybersecurity analysis can expand its sources of intelligence beyond just security logs to include open source intelligence, human intelligence, technical intelligence and analyzing the dark web. The document also discusses techniques like adopting a red team mindset and conducting red team/blue team exercises to help analysts think like adversaries. It emphasizes training analysts to consider different perspectives and think outside normal models. The goal is to help analysts detect threats more proactively by gathering intelligence from more sources and using different analytical techniques.