top of page

Our Research Process

How the TRC transforms real-world problems into defensible, engineering-driven cybersecurity research.

Image by Alvaro Reyes

Research Lifecycle Stages

​

1. Research Proposal & Scoping

  • Ideas are submitted by internal researchers, members, task groups, or through external collaboration requests.

  • Proposals are evaluated based on alignment with ISAUnited’s mission, technical merit, and feasibility.

  • Scope is defined with clear objectives, key questions, and expected deliverables.

 

2. Stakeholder Review & Acceptance

  • Proposed research undergoes initial stakeholder review from domain experts, the Technical Fellow Society, or designated review boards.

  • Input is gathered across relevant security domains (architecture, engineering, operations, compliance).

  • Approved projects are assigned to research leads and working groups.

 

3. Structured Research & Data Collection

  • Researchers follow a defined methodology including background research, literature reviews, control analysis, and modeling techniques.

  • Data is gathered through observation, testing, simulation, and empirical studies when applicable.

  • Research documentation is maintained in a defensible and auditable format.

 

4. Peer Review & Validation

  • Draft research undergoes technical peer review by ISAUnited’s qualified fellows and external reviewers as needed.

  • Research is evaluated for clarity, technical accuracy, and practical applicability.

  • Feedback is used to revise and refine the final output.

 

5. Publication & Implementation

  • Final research outcomes are published as whitepapers, standards drafts, technical frameworks, or educational materials.

  • Results are made available through ISAUnited’s digital library and partner channels.

  • When applicable, outcomes may lead to the creation of new Defensible Standards, engineering concepts, or training modules.

Guiding Principles

​​

  • Defensibility: All research must be technically defensible and backed by logic, testing, or proven theory.

  • Transparency: Research activities are documented openly with traceable decisions and stakeholder input.

  • Engineer-Ready: Deliverables must support real-world implementation by security engineers and architects.

  • Community-Oriented: Our process encourages collaboration and shared advancement across the industry.

Contribute to Our Research

​​

We invite ISAUnited members, external researchers, and industry professionals to:

​

  • Submit a Proposal – Pitch a research topic for consideration.

  • Join a Research Group – Participate in existing projects aligned with your domain expertise.

  • Request Collaboration – Propose joint studies or initiatives with ISAUnited Research Center.

​

Contact us below for inquiries.

​

Contact Us

Guest

For any questions or concerns, fill out our form or email us at:

research@isaunited.org

Thanks for Submitting!

Members

For any requests or suggestions, click here to generate a support ticket:

ISAUnited-01_white_edited.png

Institute Support Hours

HIn

Monday:          8-5 p.m. CST

Tuesday:         8-5 p.m. CST

Wednesday:  8-5 p.m. CST

Thursday:       8-5 p.m. CST

Friday:             8-5 p.m. CST

Saturday:       CLOSED

Sunsday:        CLOSED

Social Media: 

  • LinkedIn
  • X
  • Instagram
  • Facebook

Headquarters: United States. Houston, Texas.

All Rights Reserved • Property Of ISAUnited.org

© 2019-2025 Institute of Security Architecture United

bottom of page