top of page
Image by Product School

Register to Become an ISAUnited Content Author

How Engineering Standards Shaped Progress

Join ISAUnited’s global effort to advance cybersecurity as a true engineering discipline. Register to become a vetted author and gain access to ISAUnited’s collaboration platform for publishing defensible, engineering-grade cybersecurity content, including the Defensible 10 Standards (Defensible10.org) and Intrusion 8 Red Team Intelligence (Intrusion8.org).

Note: This registration form is open to practitioners, architects, and engineers worldwide. ISAUnited membership is encouraged but not required for authorship or contributions.

About This Registration

The ISAUnited Author Registration process ensures that every contributor meets ISAUnited’s technical and ethical expectations for developing defensible, evidence-oriented cybersecurity content. Once approved, you will receive contributor access to the appropriate author track based on your selected contribution path, with peer review oversight aligned to ISAUnited governance.

 

You will select your author track in the registration form:

  • Defensible 10 Standards (D10S): Parent Standards and Sub Standards development

  • Intrusion 8 Threat Profiles  (I8): Threat Profiles and Threat Cases development, supported by the Intrusion Vault

Key Points:

  • Open to ISAUnited members and non-members worldwide.

  • Requires a verifiable background in information technology, cybersecurity, cloud, or software engineering.

  • Grants access to approved author templates, the Defensible Standards Submission Schema (D-SSF), and collaboration resources.

  • For Intrusion8 authors, includes access to the Intrusion Vault catalogs (Threat Actors, Threat Vectors, Threat Tools).

  • Ensures peer-reviewed quality and defensible rigor in all submissions.

ISAUnited Author Registration

Author Track Selection

Which author track are you registering for?

GitHub Account Information

ISAUnited Membership Status

ISAUnited membership is not required to author or contribute to the Defensible 10 Standards (D10S). Participation is open to all qualified technical practitioners worldwide.

Are you a member of ISAUnited? (Required)

Contribution Intent (if applicable)

Which Defensible 10 Standard(s) are you interested in contributing to? (optional multiple selection).

Professional Background

*To be completed by non ISAUnited members or Fellows.

Registration Date
Month
Day
Year

What Happens Next

Once your registration is reviewed and approved by the ISAUnited Standards Committee, you’ll receive an email with your official contributor ID and secure access to the Defensible10.org author portal.

You’ll then gain full access to:

  • Author templates and D-SSF submission schema

  • Technical resource library

  • Peer-review coordination channels

Approved Contributor Recognition and Benefits

ISAUnited recognizes that every Sub-Standard is the result of professional expertise, collaboration, and engineering discipline.  Authors, whether individuals, teams, or organizational departments, receive formal recognition for their technical contributions to the Defensible 10 Standards (D10S) initiative.

  • Official Publication Credit - Each Sub-Standard lists its authors, co-authors, and affiliated organizations in the publication’s metadata, PDF header, and online library entry.

  • Contributor ID and Certificate - Each approved author or team is issued a unique Contributor ID and an official Certificate of Contribution from the ISAUnited Standards Office, acknowledging their technical authorship and contribution to the D10S.

  • Permanent Listing in the Defensible Standards Library - Contributors are recognized in the Defensible10.org Standards Library as part of the engineering record for that domain—ensuring long-term visibility and citation.

  • Professional Citation Rights - Contributors may reference their Sub-Standard publication in professional portfolios, résumés, and academic materials as official, ISAUnited 'Approved Work'.

  • Advancing the Cybersecurity Profession as a True Engineering Function - Each Sub-Standard strengthens the collective maturity of our industry—transforming cybersecurity from a reactive practice into a measurable, evidence-based engineering discipline.

  • Validating the Future of Technical Security Practice - Contributor-authored Sub-Standards serve as defensible proof of engineering rigor, technical accountability, and repeatable design—helping define cybersecurity’s evolution as a recognized engineering field alongside civil, mechanical, and systems disciplines.

 

Note Please Read

This registration process is open to all practitioners worldwide. Membership in ISAUnited is encouraged but not required to contribute to Sub-Standard development.

Questions?  Contact the Standards Office at info@isaunited.org or below.

bottom of page