We’ll review the history and development of the corporate network, it's interaction with the Internet and how the adoption of Cloud solutions has made the network irrelevant. We’ll explore recent developments in malware, trends in targets and attacks using case studies. Finally, we will consider an example and the ground work that will provide a secure base to work from while improving usability.