S-RM cyber experts discuss what it takes to turn cyber threat information into cyber threat intelligence, and examine what this looks like in practice.