Team Wabbi
March 24, 2025
Click below to listen to this episode of Digital Shifts aka Corporate Evolution Tales, where host Mariam sits down with Brittany Greenfield, founder and CEO of Wabbi, to discuss how to align security with business goals, and why transformation is a continuous journey—not a one-time project.
E035 of Digital Shifts – Brittany Greenfield: DevSecOps in Digital Transformation
About the session
This session of “Digital Shift” also known as “Corporate Evolution Tales” delves into the topic of digital transformation, focusing on the integration of security into the software development life cycle. The podcast is designed to provide insights and practical advice to both experienced corporate leaders and aspiring innovators.
Key speakers
- Miriam: Host of the podcast
- Brittany: CEO and founder of Wabbi, a DevSecOps cybersecurity platform
Agenda
The agenda for the session includes an introduction to the concept of digital transformation, a discussion on the integration of security into the software development life cycle, an exploration of the phases of digital transformation, and a discussion on the challenges and benefits of continuous improvement. The session also touches on the role of AI in digital transformation and provides key advice for organizations embarking on or continuing their digital transformation journeys.
Takeaways
Takeaway 1: Digital transformation is a continuous process that requires a strong foundation, starting with people, processes, and then tools.
Brittany, the CEO and founder of Wabbi, a DevSecOps cybersecurity platform, emphasized the importance of a phased approach to digital transformation. “There’s the period of excitement, oh my God, we’re really moving forward, and then there’s the term in the founder’s Journey called the trough of Despair where you start to realize how hard it is,” she stated. She further explained that after the initial excitement, organizations often face the challenge of aligning their processes and people with new technologies, which can lead to what she called the “shiny A syndrome” — the tendency to chase the latest technology without the necessary foundational work.
Brittany also highlighted the continuous improvement aspect of digital transformation: “It is not a one-time deal. You always have to be looking forward to the next thing. It’s like a revenue-driving operation. You have to be willing to draw down on the old thing to invest in the new thing.” This ongoing process ensures that organizations stay adaptable and can continuously integrate new technologies effectively.
She concluded by stressing the importance of getting the fundamentals right: “Think about building a building quickly. If you don’t have the right foundation, that building is going to topple or you’ll be left with a ton of problems that you’re constantly fixing.” Brittany advised organizations to focus on their existing technology and processes before adopting new, shiny tools, ensuring a strong and adaptable foundation for future growth.
Takeaway 2: Security should be an integral part of digital transformation, not an afterthought.
Brittany pointed out that security is often overlooked in the initial stages of digital transformation, which can lead to significant efficiency losses. “Security is not sitting at the kids table; it’s part of the conversation,” she stated. She emphasized that security should be aligned with the organization’s risk profile and goals: “If you align your security risk profile with your project risk profile, you’re going to know when you’re actually willing to stop something to fix it versus hey, it’s okay that we fix it later but can we fix it within 90 days?”
She used the example of banking apps to illustrate this point: “There’s a different risk profile for your dashboard versus your bill pay and your wire transfer because there are so many different components.” By understanding and addressing these differences, organizations can better manage their security risks and align them with their broader digital transformation goals.
Takeaway 3: Transparent communication and collaboration are crucial for successful digital transformation.
The importance of involving and communicating with the people who will be affected by digital transformation was a key point in the discussion. “If you do not win the hearts and minds of the people executing this, it doesn’t matter,” Brittany stated. She also emphasized the need for two-way communication: “It’s not just transparent communication; it’s letting them share their feelings back. Humans are critical, and we don’t like change, so you’re going to get a couple of people that are super stoked, and then a bunch of people that are going to be resistant.”
Brittany shared a practical example: “If the person entering customer records into CRM every day is like, ‘Hold on a second, why are we doing both a company field and an organization field?’ Get rid of that, don’t make it mandated.” By actively listening to and addressing the concerns of employees, organizations can foster a more positive and effective transformation process.
Insights surfaced
- Digital transformation is not just about technology; it involves people, process, and tools, with people being the most critical component.
- Security should be integrated into the digital transformation process from the beginning to avoid efficiency losses and potential breaches.
- Digital transformation is a continuous process of learning and improvement, not a one-time project.
- Organizations often face the “trout of despair” during digital transformation, a phase where the initial excitement is followed by the realization of the complexity involved.
- AI can optimize operations by supporting the workforce in working smarter, not harder.
- Transparent communication and involving all stakeholders in the digital transformation process is crucial for success.
- Foundational elements must be strong and adaptable before adopting new technologies.
- Aligning security risk profiles with organizational goals can make security more digestible and less intimidating as part of digital transformation.
Key quotes
- Brittany: “DevSecOps is not just another set of tools; it’s a transformational process, much like DevOps was for organizations.”
- Miriam: “When we are speaking about digital transformation, a lot of people are saying it’s just about automating processes, but it’s not only that; it’s all about the security first to understand how we can go safely with the path of digital transformation.”
- Brittany: “The goal is not to make every developer a subject matter expert in application security, but to improve collaboration so that developers can make educated decisions.”
- Brittany: “There’s a period of excitement, followed by the ‘trout of despair,’ and then a phase of incremental experimentation and continuous improvement.”
- Brittany: “Digital transformation is not a one-time deal; you always have to be looking forward to the next thing.”
- Brittany: “People, process, then tools. If you do not win the hearts and minds of the people executing this, it doesn’t matter what tool you buy.”
- Brittany: “Security is not just about avoiding breaches; it’s about efficiency and aligning with organizational goals.”
- Miriam: “Including people in digital transformation is crucial; they need to understand and be represented in the change process.”
- Brittany: “Make sure you have the foundation very strong and adaptable before adopting new technologies.”
- Brittany: “Security is not just about avoiding the front page of the newspaper; it’s about helping you reach your goals.”
- Brittany: “People and process, then tools. You do that, and you’re going to have the right fundamentals in place to continually integrate the latest technology into your organization.”
Related Articles
November DevSecOps Roundup: Ideas Shaping What’s Next
Hey! We’re back with the latest in DevSecOps, security by design, and everything in between. Grab your coffee ☕, and let’s dive in! 📌 Top Blogs 🟣 AI is Solving the Puzzle. Are You Missing the Corner Pieces? AI is rewriting the rules of cybersecurity—and attackers...
Invisible AppSec: The Future of Security That Moves at the Speed of Dev
Invisible AppSec: The Future of Security That Moves at the Speed of Dev The future of application security isn’t about building taller walls, creating more dashboards, or forcing developers to become part-time security experts. It’s about making security so seamlessly...
Why Your Vulnerability Backlog Will Never Shrink (and What to Do Instead)
Why Your Vulnerability Backlog Will Never Shrink (and What to Do Instead) For most organizations, the vulnerability backlog has become a permanent fixture of software development. Thousands of issues sit unresolved across code, containers, dependencies, and...
How Tech Companies Can Break Out Of Innovation Stagnation – Forbes –
This article originally appeared on Forbes on November 5, 2025 Expert Panel® Forbes Councils Member Forbes Technology Council COUNCIL POST| Membership (Fee-Based) getty For tech companies, early success can be both a gift and a trap. The same products and systems that...
Reclaiming Innovation: Why Tech Needs to Fall Back in Love with Problem-Solving
Reclaiming Innovation: Why Tech Needs to Fall Back in Love with Problem-Solving The tech industry was built on solving problems — not just building products. Yet as companies scale, many lose that original spark. Quarterly targets, feature checklists, and market...
Policy as Code: The Missing Link in DevSecOps Maturity
Policy as Code: The Missing Link in DevSecOps Maturity For years, the promise of DevSecOps has been clear: integrate security into development without slowing delivery. Organizations have invested heavily in automation, CI/CD pipelines, and vulnerability scanning. But...
New Insights, Big Ideas: Wabbi’s October DevSecOps Roundup
Monthly Roundup Hey! We’re back with the latest in DevSecOps, security by design, and everything in between. Grab your coffee ☕, and let’s dive in! 📌 Top Blogs 🔹 Beyond Automation: What True AppSec Orchestration Means in 2025 In 2025, AppSec success requires more than...
Zero Trust in AppSec: Why It Belongs in Your Pipelines, Too
Zero Trust in AppSec: Why It Belongs in Your Pipelines, Too Zero Trust has become a cornerstone of modern cybersecurity strategies. The principle is simple but powerful: “never trust, always verify.” Traditionally, Zero Trust has been applied at the network and access...
From Reactive to Proactive: Why AppSec Needs to Evolve Beyond Scanning
From Reactive to Proactive: Why AppSec Needs to Evolve Beyond Scanning For years, application security has been stuck in a reactive cycle. Teams run scans, wait for results, chase long lists of vulnerabilities, and try to patch as quickly as possible. While this...
Wabbi Named a “Vendor to Watch” in IDC MarketScape: Application Security Posture Management (ASPM) 2025 Vendor Assessment
BOSTON / Press Release / September 18, 2025 Wabbi, a leader in Application Security Posture Management, is proud to announce that it has been named as a Vendor to Watch in the IDC MarketScape: Application Security Posture Management (ASPM) 2025 Vendor Assessment. This...
Wabbi Announces Findings of Annual Continuous Security Report
BOSTON / Press Release / May 6, 2024 Progress in Integrating Security into Software Development, Progress in Adoption, but Bottlenecks Persist Wabbi, the leading application security posture management platform, today announced the findings of its annual report on...
Wabbi Announces General Availability of its Advanced Application Security Risk Index Enabling Risk-Management-by-Design
BOSTON / Press Release / February 21, 2024 Wabbi, the leader in Application Security Posture Management (ASPM), today announced the general availability of its Advanced Wabbi Risk Index. The Application Security Risk Index is a key component of Wabbi’s...
Wabbi Announces Phil Lawrence as New CTO to Spearhead Next Generation Application Security Posture Management Platform
BOSTON, MA, USA / November 20, 2023 /Originally Published at EINPresswire.com Industry leading ASPM provider, Wabbi, has appointed Phil Lawrence as CTO to lead product vision and growth in this high-demand cybersecurity space. Today, Wabbi (www.wabbisoft.com), the...
Wabbi Founder & CEO, Brittany Greenfield, Named 40 under 40
BOSTON, MA, USA / August 16, 2023 Brittany Greenfield, CEO & Founder of Wabbi, the leading ASPM platform, has been named to Boston Business Journal's prestigious 40 Under 40 list for 2024. This annual award honors 40 outstanding professionals under the age of 40...
Wabbi Named in Three Gartner® Reports as ASPM Sample Vendor
BOSTON, MA, USA / August 1, 2023 For more information on Wabbi's Application Security Posture Management platform, visit https://wabbisoft.com. Wabbi, a leading provider of Application Security Posture Management (ASPM) solutions, is pleased to announce that it has...
WABBI NAMED IN 2023 GARTNER® HYPE CYCLE FOR APPLICATION SECURITY REPORT AS AN ASPM SAMPLE VENDOR
BOSTON, MA, USA / July 25, 2023 / Originally Published at EINPresswire.com/ Wabbi, the leading Application Security Posture Management (ASPM) platform, today announced that it has been recognized as a Sample Vendor for Application Security Posture Management (ASPM) in...
Wabbi Named in 2023 Gartner® How to Select DevSecOps Tools for Secure Software Delivery Report as an ASPM Sample Vendor
BOSTON, MA, USA / June 14, 2023 /Originally Published at EINPresswire.com Wabbi announces its inclusion in the 2023 Gartner® How to Select DevSecOps Tools for Secure Software Delivery report as an Application Security Posture Management (ASPM) sample vendor. Gartner®...
Wabbi Unlocks the Secret to Enterprise Secrets Management
Wabbi unveils new Secrets Mangement solution as part of their leading application security posture management and orchestration platform. BOSTON, MA, USA / May 17, 2023 /Originally Published at EINPresswire.com Today, Wabbi, a leader in Application Security Posture...
Wabbi Named to CyberTech 100 for Leadership in Application Security Posture Management & Orchestration for Financial Institutions
BOSTON, MA / May 11, 2023 / EINPresswire.com Wabbi, the leading application security posture management & orchestration company, announced today that it has been named in the CyberTech100 list for 2023. Sponsored by FinTech Global and now in its fourth year, the...
Wabbi Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2023
Wabbi Wins Editor’s Choice for DevSecOps in 11th Annual Global InfoSec Awards at #RSAC 2023 SAN FRANCISCO/ Press Release / April 24, 2023 Wabbi is proud to announce we have won the following award(s) from Cyber Defense Magazine (CDM), the industry’s leading electronic...
Reclaiming Innovation: Why Tech Needs to Fall Back in Love with Problem-Solving
Reclaiming Innovation: Why Tech Needs to Fall Back in Love with Problem-Solving The tech industry was built on solving problems — not just building products. Yet as companies scale, many lose that original spark. Quarterly targets, feature checklists, and market...
Policy as Code: The Missing Link in DevSecOps Maturity
Policy as Code: The Missing Link in DevSecOps Maturity For years, the promise of DevSecOps has been clear: integrate security into development without slowing delivery. Organizations have invested heavily in automation, CI/CD pipelines, and vulnerability scanning. But...
Zero Trust in AppSec: Why It Belongs in Your Pipelines, Too
Zero Trust in AppSec: Why It Belongs in Your Pipelines, Too Zero Trust has become a cornerstone of modern cybersecurity strategies. The principle is simple but powerful: “never trust, always verify.” Traditionally, Zero Trust has been applied at the network and access...
From Reactive to Proactive: Why AppSec Needs to Evolve Beyond Scanning
From Reactive to Proactive: Why AppSec Needs to Evolve Beyond Scanning For years, application security has been stuck in a reactive cycle. Teams run scans, wait for results, chase long lists of vulnerabilities, and try to patch as quickly as possible. While this...
From Weak Link to First Line of Defense: How DevSecOps Turns Teams into Security Partners
From Weak Link to First Line of Defense: How DevSecOps Turns Teams into Security Partners We’ve all heard it: People are the weakest link in cybersecurity. And in software development, it often feels true—developers skipping scans to hit a release date, ops teams...
Security That Doesn’t Get in the Way: Why Dev Experience is the Real Key to DevSecOps
Security That Doesn’t Get in the Way: Why Dev Experience is the Real Key to DevSecOps We say we want to “shift left.” We say we want secure code from the start. But too often, security tools and processes still expect developers to leave their workflows, learn new...
AI is Solving the Puzzle. Are You Missing the Corner Pieces?
AI is Solving the Puzzle. Are You Missing the Corner Pieces? The game has changed—and it’s moving faster than ever. Artificial intelligence is no longer just a tool for innovation. It’s now a powerful asset in the hands of attackers, helping them scan, test, and...
Security That Works How Developers Work: Why Dev-Centric Design is Non-Negotiable
Security That Works How Developers Work: Why Dev-Centric Design is Non-Negotiable For years, application security has been treated as a destination—something developers "hand off" for validation at the end of the build process. But in a world of continuous...
Secure by Design: Embedding Risk-Based AppSec in Every Sprint
Secure by Design: Embedding Risk-Based AppSec in Every Sprint In the high-speed development world, embedding security into the software development lifecycle (SDLC) is no longer optional—it’s foundational. But as teams work to shift left and integrate security...
Beyond Automation: What True AppSec Orchestration Means in 2025
Beyond Automation: What True AppSec Orchestration Means in 2025 In the ever-evolving world of software security, “automation” has become a buzzword synonymous with efficiency, speed, and scalability. But in 2025, automation alone isn’t enough. As software delivery...