Chapter 8 Update: Bitcoin


The Netherlands American Chamber of Commerce of the Southeastern United States (NACCSE recently hosted Megan Burton, founder and CEO of CoinX ( to discuss the recent digital currency disruption and “Explore the Evolution of Bitcoin and What’s in it for You and Your Business?” The session’s description stated, “Bitcoin is an innovative payment network and a new kind of money that could change the future of the Internet, and have significant impact on politics and economics.” I discuss crypto-currencies (of which Bitcoin is just one of many, abet the most popular and well-known one) in Chapter 8 of the Managing Online Risk Book so I though Ms. Burton’s session could give us some helpful updates. She did not disappoint.

She began CoinX in 2012 prior to any regulation in the area at all. You may recall that Bitcoin was created with the idea that it would not be regulated – it is a currency without a country, and therefore without a government. Creators of Bitcoin wanted to keep it that way. This is one of the reasons Bitcoin creators because associated with a stereotype of anti-government technology-savvy rebels. But times have changed. Ms. Burton found her company, which she set up as a Bitcoin exchange, categorized as a Money-Service Business (MSB) under the US government. This has caused a number of changes for CoinX to continue to operate. She has enlisted an army of lawyers and compliance people – she joked that her compliance expense is higher than her total payroll – and is still in the process of sorting everything out. She has transferred the exchange service to the Netherlands and is now in the US listed as a software company. She also indicated that CoinX is looking at possibly becoming a bank to offset some of the confusion and vagueness of what the company actually does in regards to a crypto-currency.

After an overview of Bitcoin basics – what is is, who uses it, what does the Bitcoin market ecosystem look like, what are some of the concerns and risks related to using Bitcoins – she highlighted that “Bitcoins” actually has two definitions – one as a currency, but a second as a protocol – and it is the protocol that seems to be taking off with a number of new applications being developed to transfer assets using the protocol without a middle man for validation. One example she gave comes from a group of developers who came up with “ShoCard” for digital identity management. You can view the video introduction on YouTube at: More information about this identity solution can be found at their website:

Other highlights from the session:

Some other resources regarding Bitcoins and Crypto-Currencies are listed below. Do you own any? Have you transacted with any? What has been your experience or what are your concerns regarding this? Share in the comments below.


The Rise and Fall of a Bitcoin Kingpin

David Kushner, 08/27/2015


What is a Bitcoin?

Wall Street Journal, 04/12/2013


Oxford Dictionaries add “Blockchain” and “Miner”

Stan Higgins, 08/27/2015


A brief attempt at explaining the madness of cryptocurrency

Mariella Moon, 01/21/2015


Dodgecoin: The Most Stable Cryptocurrency?

P.H. Madore, 07/13/2015



Chapter 2 Update: Biometrics

Believe it or not, biometrics has been around for over 20 years. Recently I participated in an ISSA Webinar titled “Biometrics & Identity Technology Status Review” ( The moderator was Phillip Griffin, ISSA Fellow, and the speakers were Michael F. Angelo and Kevin Mangold.

Angelo began the 2-hour session with an eagle eye approach to the topic – he began with definitions types, and a brief history of biometric technology and application. For him the three basics of biometrics are: quality control, types, and anti-spoofing. He divided the kinds of biometrics into four categories:

  1. Common (fingerprint, iris, face, voice)
  2. Becoming more common (handwriting, keystroke, hand geometry)
  3. Rare (retina, handprint, thermography of faces)
  4. Exotic (DNA, gait, brain waves, smell)

Angelo concluded by stating his belief that privacy and specifically legislation passed because of privacy concerns is the number one threat against the full-scale use of biometrics and application development.

The second speaker was Kevin Mangold a computer scientist from NIST. His focus was on security standards for identity management and biometrics. He emphasized the work of OASIS – Organization for the Advancement of Structured Information Standards, which began in 1993 and currently has over 5000 participants from 600+ organizations and 65+ countries (

The ISSA conference page for this session does have a PowerPoint slide deck you can review for details of the above discussion.

Some recent articles and additional resources to review regarding biometrics are listed below. Although it’s been around for a while biometrics are developing rapidly as more and more consumers express concern regarding safeguarding their data and personal information.

What has been your experience with biometrics? Any research, books, etc. you would recommend for others to review won this topic? Join the conversation by entering your comments below.


Mobile Biometrics Market Poised To Explode By 2020

Amanda Vicinanzo, 08/25/2015


Biometrics: The password you cannot change

Aimee Chanthadavong, 08/26/2015


The Boring and Exciting World of Biometrics

Tim De Chant 06/18/2013


The Biometric Consortium

Biometrics Institute


Managing Online Risk’s Monthly Recap (July 2015) – Stories Relating to Online Security & Risk

FTC "Start with Security" Webpage

FTC “Start with Security” Webpage

Welcome to our monthly recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: Online Privacy swindle; proposed cyber-legislation; Windows 10 security; how to respond to a data breach; online reputation management infographics; cyber-risk insurance update; FTC’s “Start with Security,” Big data, big security; privacy reforms; Blackberry & Google solidify deal; and more.

These are some of the articles, reports, posts, etc. that caught our attention this month. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a weekly recap. The links will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.