Skip to main content
L.O.C.K. S.T.A.R. Logo

Ransom-ISAC

L.O.C.K. S.T.A.R. Application

Level of Critical Knowledge in Specialized Techniques, Advancements and Research

Think Michelin Stars for cybersecurity research—exceptionally prestigious, difficult to earn, and meaningful recognition for those creating content that advances defense against ransomware, APTs, and threat actors.

Personal Information

Tell us about yourself, your background, and what drives your cybersecurity work. Be specific and authentic.

Areas of Expertise

Select all domains that apply to your expertise.

Research Proposal

The bar is exceptionally high. Be specific and detailed. No vague generalities—we read every word.

What specific threat actor, campaign, or threat landscape will you focus on? Name names. Be concrete.

What specific elements, indicators, or patterns will you monitor and analyze? Get granular.

How will you conduct this research? What tools, techniques, and analytical approaches? We want specifics, not buzzwords.

Why does this matter? What actionable intelligence or defensive value will it provide? Be concrete about outcomes.

Contribution Format

Accepted proposals become in-depth technical blog posts for Ransom-ISAC. Co-owned content—you get full recognition while advancing open, accessible threat intelligence.

Your Name, Your Work

All content you produce will be attributed to you across our public channels:

🌐Ransom-ISAC Website
💼Our LinkedIn
💻Our GitHub repository (MDE rules, YARA rules, malware samples)
🔗CIRCL's MISP IOC Feed

Your application will be strengthened if you are willing to present your research at future conferences upon our request. Are you prepared to do this?

Anything else that strengthens your application? Prior work, unique access, timeline, collaborators?

Ransom-ISAC is committed to protecting and respecting your privacy. Please confirm your consent below.

You can withdraw consent at any time. For more information on how we protect your privacy, please review our .

Questions? Contact us at [email protected]

Vendor-neutral • Breaking barriers • Highest standards