For a long time, the idea of a trusted network inside a defined corporate perimeter was prevalent. With the advent of cloud computing, microservices, and remote work this assumption is not true anymore. Networks are inherently unsafe, and you should always assume that the attacker is already in your network. This deck provides some insights to this new mantra.