The document discusses putting the human back in the loop for analysis. It describes the speaker's background and agenda, which includes understanding information flow and a cyber threat intelligence (CTI) framework. The speaker advocates for understanding the full context of one's environment and information flows. He presents the CTI framework of collect, catalog, assess, act (CCAA) and examples of applying it to indicators of compromise, reports, and incident response. The speaker emphasizes understanding both technical and strategic analysis and sharing data and knowledge collaboratively.