British Ambassador to Speak On NATO and the Changing Face of Transatlantic Security

Join us as Defense One hosts an address and live conversation with British Amb. Peter Westmacott on NATO and Transatlantic Security. By Kevin Baron

From the editor:

Please join us for a live keynote address and interview with Sir Peter Westmacott, the British ambassador to the United States. Defense One will host this discussion, entitled: NATO and the Changing Face of Transatlantic Security.

The 2014 NATO Summit, hosted by the United Kingdom, is less than two months away and the year’s events in Ukraine have dramatically changed the conversation in the run up to the meeting in Wales. Meanwhile, after tackling difficult decisions, the United Kingdom now has a balanced defense budget and has reiterated its commitment to meeting the 2 percent spending pledge. But questions remain about the future of the alliance in the face of complex security challenges around the world. Amb. Westmacott’s remarks will preview the NATO summit and his participation later next week in the Aspen Security Forum.

Westmacott became the British ambassador to the United States in January 2012. This is his second posting in Washington, having previously served as the British Embassy’s counsellor for political and public affairs in the mid-1990s. Prior to his service as ambassador to the United States, Peter served as the British ambassador to France—from 2007 to 2011—and as ambassador to Turkey starting in 2002.

Defense One delivers news, breaking analysis and ideas on the topics and trends that define the future of U.S. defense and national security. Our editorial approach is to cover the people and forces shaping a new era for defense through the post-war transformation and into a 21st century global security landscape.

The live discussion will convene on Monday, July 21st from 1:30 to 3pm at the Watergate. View more details and register for this live event here:

The conversation will also be livestreamed on


Kevin Baron
Executive Editor
Defense One

Close [ x ] More from DefenseOne

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.


When you download a report, your information may be shared with the underwriters of that document.