picture of cale dansbee

Cale Dansbee

TOPSTONE | Chief Security Officer

Greater San Diego Area Managed Security Services Provider (MSSP) Previous: Director of IT | AUSGAR View More Education: Master's Degree | MBA View More

Personal Details

  • Certifications: CISSP-ISSEP, CCSK
  • Clearance Level: TS/SCI
  • Years of Experience: 20+

About Me

I'm a lifelong technology and cybersecurity evangelist. I've been passionately involved in technology since 1994 and continue to learn everything I can about it.

A Purple Heart decorated, service-disabled veteran, I enjoyed a satisfying career in the US Air Force. Initially, I was an F-15E Strike Eagle crew chief. However, after a few years, it became well known that I was better with computers than jet engines. I cross-trained into combat computer systems operations in 1996 and I've been hooked on technology since.

Over the years, I have intentionally worked toward the 'jack-of-all-trades' title because I wanted to have a diverse background. My first degree was in computer-based advertising design. My next degree was in technology management, with a minor in web based programming languages. My most recent degree is an MBA.

For the last 20+ years, I have worked to acquire a balance of formal education, technical certification, and work experience.

Read More

My Work Experience

From MAY 2010 To Present

(Started my own business)


Chief Security Officer

Managing and operating the Managed Security Services Provider (MSSP) consulting practice, providing risk intelligence, vulnerability analysis, and risk management/mitigation services to San Diego area businesses.

From AUG 2015 To Present

(Data Center Virtualization)

KMS San Diego, CA

Senior Information System Security Engineer

Serving as Chief Architect of a distributed R&D lab environment. Responsible for all engineering, policy/process, information security requirements definition and documentation. Supporting international organizations in an information security engineering capacity.

From FEB 2005 To JAN 2015

(Executive Leadership)

AUSGAR San Diego, CA

Director of IT

Responsible for the overall planning, organizing, and execution of all IT functions at all locations within the US and deployed abroad. This included directing all IT operations to meet customer requirements as well as the support and maintenance of existing applications and development of new technical solutions.

From DEC 2003 To FEB 2005

(Navy Marine Corps Intranet)

R.L. Phillips San Diego, CA

Senior Network Security Engineer

Responsible for one or more parts of the Navy Marine Corps Intranet (NMCI), Proving Center Laboratory (PCL) Certification and Accreditation (C&A) operations including penetration testing via scans, vulnerability assessment evaluations, drafting DEV400 series documents, and conducting risk assessments. Also responsible for aiding in the facilitation of government Certifying Authority (CA) participation with regard to certification. Provided technical assistance and documentation of Security Test and Evaluations completed on solutions being certified.

From DEC 2000 To DEC 2003

(securing large scale programs)

OSEC San Diego, CA

Senior Network Security Engineer

SPAWAR Systems Center (SSC) San Diego technical team member for the research, design, and integration of the Systems Management architecture within project titled Joint Task Force, Wide Area Relay Network (JTF WARNET). This project included the US Army, Special Forces, US Navy, and US Marine agencies, and the communications architecture spanned from New Jersey to San Diego, to Okinawa Japan, and extends onto several Navy ships.

From FEB 2000 To DEC 2000

(large program engineering)

DRS Technologies San Diego, CA

Senior Network Security Engineer

Served as a senior field engineer for the research, development, integration, and application of the Advanced Concept Technology Demonstration (ACTD) titled Extending the Littoral Battlespace (ELB). This program utilized advanced military radios, commercially available wireless network products, several military communications packages, and GTE Taclane encryption devices to provide a SECRET HIGH, high speed, highly mobile, tactical wireless network.

From MAR 1997 To DEC 2005

(Combat communications)

Air National Guard San Diego, CA

Information Assurance Manager (IAM)

Managed all computer equipment and related software for 32 complete systems as part of an 1800 computer Metropolitan Area Network (MAN). Security Awareness and Training point of contact for the maintenance complex. Participated in Red Teaming exercises to test security implementations. Actively participated on several computer alert teams including incident response, virus alert, capture and cleaning, and all Y2K testing/planning. Coordinated all security levels and individuals for necessary access to confidential areas/software.

From JUL 1987 To MAR 1997

(let's learn computers!)

US Air Force Las Vegas, NV

Small Computer Manager

Served as field level representative for unit-based small computers, including the ordering, receiving, configuring, and maintaining of small computer systems located at the squadron level.

My Education

Skills & Abilities

  • Depth of Knowledge — I have been working in and around information security and enterprise systems for well over 15 years. I have pursued training, experience, knowledge, and certification in multiple functional areas including vulnerability management, enterprise risk management, security information and event management (SIEM), governance and policy development, leadership development, staff training, and financial management.
  • Emotional Intelligence — Over the years, I have learned that passion, tenacity, and zeal, used improperly, can be detrimental to a team. I sought executive coaching and worked hard to develop a higher level of emotional intelligence to better understand the complexities of emotion in the workplace.
  • Product Knowledge — The opportunities I have had to research, implement, and support new enterprise technologies over the years have provided a superb foundation for helping businesses strategize and implement new technology. My broad experiences with cloud solutions like Microsoft Azure, Amazon AWS, Microsoft Office 365, and VMware have helped me forge new pathways to the cloud.
  • Military Grade Security — One of the more valuable lessions my work experiences have taught me is that when it comes to enterprise security, defense in depth, and overall cybersecurity readiness, the Department of Defense got it right. I've spent 10+ years helping to introduce military grade security to commercial businesses in an effort to enhance their overall cybersecurity operational readiness.
  • Leadership Flexibility — I am a fan of the Ken Blanchard Companies' Situational Leadership II® model and work hard every day to learn how to be a more effective situational leader. Over the years, I came to realize that different situations require a different approach to leadership. Working to develop greater flexibility as a leader has helped me foster and grow productive, effective, and fun teams of people who love what they do.
  • Thirst for Knowledge — I am a lifelong learner, avid reader, and student of life and technology. I enjoy striving to implement what I learn from great books like Good to Great and Built to Last, and even though the learning curve of technology feels like a vertical line most of the time, I truly enjoy learning and sharing everything I can.


My Blog

Life's A Breach

There are misconceptions about data breaches, their affect, impact, and cost. Don’t allow yourself to think, “We haven’t been breached”, “We won’t get breached”, or “A breach won’t seriously affect us”. The odds are good that you’ve already been breached and don’t know it. What should concern you is whether or not you know what was stolen. Surprisingly, most business owners don’t know what data they are holding that could cost them the most. Nor do they know where their critical data lives, or who has access to it. If you choose not to take a proactive stance on your businesses security, you should at least know what data matters most to your business, where it resides, and who has access to it.

Risk Intelligence Quiz

Unprotected data puts your entire business at risk. Answer these 4 questions to improve your risk intelligence - What data is most critical to your business? How could an attacker gain access to and steal your data? Who inside and outside of your organization has access to this data? What will the theft of this data cost your business?

If your business does not classify its data, it is unlikely that you will be able to answer the first question. If your business has been busy getting real work done, and too many people have access to your data, the risk of theft is high. These two elements combined typically mean the cost of theft is signifcantly higher.


Passion-Fueled / Service Driven


Let's build something great together!