Our Research Process
ISAUnited Research Center's research process is built on clarity, discipline, and practicality. We combine structured engineering methodologies with real-world cybersecurity needs to ensure that every research initiative we pursue is technically rigorous, aligned with industry relevance, and capable of delivering actionable outcomes for practitioners.
​
Our process is designed to uphold the highest levels of transparency, peer accountability, and defensible outcomes, making it distinctively aligned with enterprise security architecture and engineering principles.

Research Lifecycle Stages
​
1. Research Proposal & Scoping
-
Ideas are submitted by internal researchers, members, task groups, or through external collaboration requests.
-
Proposals are evaluated based on alignment with ISAUnited’s mission, technical merit, and feasibility.
-
Scope is defined with clear objectives, key questions, and expected deliverables.
2. Stakeholder Review & Acceptance
-
Proposed research undergoes initial stakeholder review from domain experts, the Technical Fellow Society, or designated review boards.
-
Input is gathered across relevant security domains (architecture, engineering, operations, compliance).
-
Approved projects are assigned to research leads and working groups.
3. Structured Research & Data Collection
-
Researchers follow a defined methodology including background research, literature reviews, control analysis, and modeling techniques.
-
Data is gathered through observation, testing, simulation, and empirical studies when applicable.
-
Research documentation is maintained in a defensible and auditable format.
4. Peer Review & Validation
-
Draft research undergoes technical peer review by ISAUnited’s qualified fellows and external reviewers as needed.
-
Research is evaluated for clarity, technical accuracy, and practical applicability.
-
Feedback is used to revise and refine the final output.
5. Publication & Implementation
-
Final research outcomes are published as whitepapers, standards drafts, technical frameworks, or educational materials.
-
Results are made available through ISAUnited’s digital library and partner channels.
-
When applicable, outcomes may lead to the creation of new Defensible Standards, engineering concepts, or training modules.
Guiding Principles
​​
-
Defensibility: All research must be technically defensible and backed by logic, testing, or proven theory.
-
Transparency: Research activities are documented openly with traceable decisions and stakeholder input.
-
Engineer-Ready: Deliverables must support real-world implementation by security engineers and architects.
-
Community-Oriented: Our process encourages collaboration and shared advancement across the industry.
Contribute to Our Research
​​
We invite ISAUnited members, external researchers, and industry professionals to:
​
-
Submit a Proposal – Pitch a research topic for consideration.
-
Join a Research Group – Participate in existing projects aligned with your domain expertise.
-
Request Collaboration – Propose joint studies or initiatives with ISAUnited Research Center.
​
Contact us below for inquiries.
​