#FutureMaker: Michael Dietsch

Michael Dietsch: Hungry for solving clients’ most pressing security technology problems

In my 17 years as an Account Executive with Siemens, I’ve been involved in a lot of different endeavors: business development, account management, systems, engineering, consulting and program management.  Focused on critical infrastructure security, I’ve supported cities, airports and major universities. Currently, I’m based in Los Angeles leading the account management team in support of a utility client. No matter where I am, though, I still possess a hunger for solving clients’ most pressing security technology problems. The single constant in my career is my desire to discover and apply new technologies. Just as the evolution of converged solutions, analytics and advanced sensors changed the physical security market over the past decade, we are now experiencing similar transformative developments. The IoT (Internet of Things), cloud computing, AI (artificial intelligence), deep learning, and, of course, cybersecurity are the latest industry disruptive advancements that my team and I must continue to understand and embrace in terms of their impact and application. That mindset underpins every conversation that I start with a customer about security infrastructure, because the first step to solving a problem is understanding why it exists. I routinely witness organizations make the same planning and design mistakes, starting with the defining of their “business problem.” So developing clear, tangible business-requirement documentation is essential. Our team follows a systems-development lifecycle approach that details the progress of the design concept against the validation of those requirements.  Simply, if we can capture and detail the problem, we can find and apply a technology to solve it.   Today, however, the technical solutions we seek face an evolving complexity of the cyber environment. This has a tremendous impact on the physical security of today’s critical infrastructure organizations. Often, our clients need Siemens to have a holistic understanding of their security posture, their program and the planning process to protect their assets and people. In turn, we must maintain a comprehensive approach to the whole cyber environment, and our long history and proven methodology for deploying security solutions of the largest scale is essential in these efforts. In the face of such challenges, my personal motivation comes from the belief that ensuring my clients’ success will lead to additional, continued and ultimately better business opportunities for Siemens and myself. Maintaining reciprocal value for both the client and Siemens is a core value of my approach, and has served me well for many years and will, I hope, for many years to come.