Someone breaking into your network is inevitable. Threat intelligence is a lifeblood when investigating a potential break-in. While threat intelligence sharing is common practice via ISACs or informal networks, most is typically missing context and relevancy for organizations. But when a trusted set of peers can share threat intelligence anonymously and it's combined with automation and orchestration, they can dramatically improve their ability to quickly thwart attacks – even proactively. This talk outlines how to share threat intelligence anonymously and leverage an enterprise security response engine to reduce the time to identify and respond to breach from weeks down to minutes.