Defense One Summit Live Streaming Video

Follow all of the conversations, insights and debates during the Defense One Summit. By Defense One Staff

Welcome to the Defense One Summit!

Please join the summit via the live streaming video below. Also be sure to follow the conversation on Twitter at @DefenseOne, and contribute to the debate by using the hashtag #DefOneSummit. Twitter handles for many of our speakers and moderators are linked below.

(Update: you can find all of the videos from Defense One Summit here)

8:30-8:35 AMOpening Remarks by Tim Hartman, President, Government Executive Media Group

8:35-9:00 AM: Dr. Arati Prabhakar, Director of the Defense Advanced Research Projects Agency, in conversation with CNN Pentagon Correspondent Barbara Starr

9:05-9:35 AMAir Force Acting Secretary Eric Fanning in conversation with Stephanie Gaskell, Associate Editor of Defense One

9:40-10:00 AMRemarks by Elizabeth McGrath, Deputy Chief Management Officer, Department of Defense

11:10-11:40 AM: Members of Congress Roundtable Discussion featuring Rep. Adam Kinzinger (R-IL), Rep. Duncan Hunter (R-CA) and  Rep. Tulsi Gabbard (D-HI), moderated by Major Garrett, CBS News

11:45 AM-12:05 PMRemarks by Lt. Gen. Keith Walker, Deputy Commanding General, Futures/Director, Army Capabilities Integration Center, Army Training and Doctrine Command

12:10-12:35 PM: Lt. Gen. Terry Wolff, Director, Strategic Plans & Policy, Joint Staff, in conversation with James Kitfield, Senior Correspondent, National Journal

12:35-1:35 PM: Lunch Break

2:30-3:00 PMUnder Secretary of Defense (Comptroller) Robert Hale in conversation with Tom Shoop, Editor in Chief, Government Executive

3:05-3:30 PMSecretary of Defense Chuck Hagel in conversation with Kevin Baron, Executive Editor, Defense One

3:35-4:00 PMAmbassador James Dobbins, State Department Special Representative for Afghanistan and Pakistan, in conversation with Gayle Tzemach Lemmon, Senior Fellow, Council on Foreign Relations

4:05-4:20 PMRear Adm. John Kirby, Chief of Information for the Navy, in conversation with Jamie Tarabay, Senior Writer, Al Jazeera America

4:25-4:55 PMAssistant Secretary of Defense for International Security Affairs Derek Chollet in conversation with Kevin Baron

4:55-5:00 PMClosing Remarks by Kevin Baron

Close [ x ] More from DefenseOne

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.


When you download a report, your information may be shared with the underwriters of that document.