The document discusses using external threat intelligence to monitor brands and supply chains. It recommends inventorying important external assets and integrating threat intelligence data sources. Specific sources discussed include suspicious domain registrations, network cleanliness data, social media/dark web monitoring, credential exposures, and phishing campaigns. Case studies show how these sources uncovered fraudulent procurement attempts, risky vendors, leaked credentials, and brand-targeting attacks. The document emphasizes that organizations must monitor beyond their own networks to identify supply chain threats.