top of page

Our Research Process

ISAUnited Research Center's research process is built on clarity, discipline, and practicality. We combine structured engineering methodologies with real-world cybersecurity needs to ensure that every research initiative we pursue is technically rigorous, aligned with industry relevance, and capable of delivering actionable outcomes for practitioners.

​

Our process is designed to uphold the highest levels of transparency, peer accountability, and defensible outcomes, making it distinctively aligned with enterprise security architecture and engineering principles.

Image by Alvaro Reyes

Research Lifecycle Stages

​

1. Research Proposal & Scoping

  • Ideas are submitted by internal researchers, members, task groups, or through external collaboration requests.

  • Proposals are evaluated based on alignment with ISAUnited’s mission, technical merit, and feasibility.

  • Scope is defined with clear objectives, key questions, and expected deliverables.

 

2. Stakeholder Review & Acceptance

  • Proposed research undergoes initial stakeholder review from domain experts, the Technical Fellow Society, or designated review boards.

  • Input is gathered across relevant security domains (architecture, engineering, operations, compliance).

  • Approved projects are assigned to research leads and working groups.

 

3. Structured Research & Data Collection

  • Researchers follow a defined methodology including background research, literature reviews, control analysis, and modeling techniques.

  • Data is gathered through observation, testing, simulation, and empirical studies when applicable.

  • Research documentation is maintained in a defensible and auditable format.

 

4. Peer Review & Validation

  • Draft research undergoes technical peer review by ISAUnited’s qualified fellows and external reviewers as needed.

  • Research is evaluated for clarity, technical accuracy, and practical applicability.

  • Feedback is used to revise and refine the final output.

 

5. Publication & Implementation

  • Final research outcomes are published as whitepapers, standards drafts, technical frameworks, or educational materials.

  • Results are made available through ISAUnited’s digital library and partner channels.

  • When applicable, outcomes may lead to the creation of new Defensible Standards, engineering concepts, or training modules.

Guiding Principles

​​

  • Defensibility: All research must be technically defensible and backed by logic, testing, or proven theory.

  • Transparency: Research activities are documented openly with traceable decisions and stakeholder input.

  • Engineer-Ready: Deliverables must support real-world implementation by security engineers and architects.

  • Community-Oriented: Our process encourages collaboration and shared advancement across the industry.

Contribute to Our Research

​​

We invite ISAUnited members, external researchers, and industry professionals to:

​

  • Submit a Proposal – Pitch a research topic for consideration.

  • Join a Research Group – Participate in existing projects aligned with your domain expertise.

  • Request Collaboration – Propose joint studies or initiatives with ISAUnited Research Center.

​

Contact us below for inquiries.

​

Contact Us

Guest

For any questions or concerns fill out our form or email us at:

info@isaunited.org

Thanks for Submitting!

Members

For any requests or suggestions, click here to generate a support ticket:

ISAUnited-01_white_edited.png

Institute Support Hours

HIn

Monday:          8-5 p.m. CST

Tuesday:         8-5 p.m. CST

Wednesday:  8-5 p.m. CST

Thursday:       8-5 p.m. CST

Friday:             8-5 p.m. CST

Saturday:       CLOSED

Sunsday:        CLOSED

Social Media: 

  • LinkedIn
  • X
  • Instagram
  • Facebook

Headquarters: United States. Houston, Texas.

All Rights Reserved • Property Of ISAUnited.org

© 2019-2025 Institute of Security Architecture United

bottom of page