i2Coalition Member Spotlight: CTM360
In operation for 10 years and counting, CTM360 offers fully managed, cloud-based cybersecurity against threats from all online sources—from the surface level to the deep and Dark Web. This innovative company’s turn-key solution requires no installations or configurations, and is backed up by around-the-clock professional support. We caught up with Sameer Mohammad, Head of CTM360 CIRT, to discuss regulation, the geopolitical impact on cybersecurity, and the double-edged sword that is AI.
i2Coalition: Can you give us the elevator pitch for CTM360?
Sameer Mohammad: As a global leader in Digital Risk Protection, our mission is to make the Internet safer for businesses and their customers. CTM360 specializes in managed takedowns and solving external security risks and threats. We proactively protect organizations by neutralizing cyber threats in real time, leveraging automation and expertise to achieve unparalleled takedown speeds and success rates.
i2Coalition: HackerView sounds interesting—can you tell us more about the idea behind it?
SM: HackerView offers organizations visibility into how attackers may target their digital assets. By analyzing an organization’s public-facing infrastructure through a hacker’s lens, we provide actionable insights to fortify their defenses and preempt potential attacks. This proactive approach ensures that misconfigurations and vulnerabilities are addressed before they can be exploited.
i2Coalition: What impact do you think recent geopolitical events have had on your more recent growth?
SM: Geopolitical shifts have heightened the need for cybersecurity, particularly in sectors such as finance, energy, and government. As organizations face increased risks from state-sponsored actors and cross-border cybercrime, demand for CTM360 has grown significantly. Our ability to adapt to global threats and deliver rapid, effective responses has been a key driver of our growth.
i2Coalition: How has the improvement of AI (especially generative AI) impacted your business environment?
SM: Generative AI has tremendous potential but is also a double-edged sword. There are numerous use cases that we have solved for, and it enables higher productivity and increasing efficiency for our line of work. We continuously adapt by integrating advanced AI models into our platforms, allowing us to stay ahead of emerging risks.
i2Coalition: Why did your team find it important to join the i2Coalition?
SM: Joining i2Coalition aligns with our commitment to fostering collaboration and driving innovation in cybersecurity. We see this as an opportunity to contribute to meaningful initiatives—especially in combating online abuse, and to shape the future of Internet policy alongside industry leaders.
i2Coalition: Which i2Coalition initiatives connect most deeply with your team’s ethos?
SM: The Secure Hosting Alliance (SHA) resonates most strongly with us. Its focus on anti-abuse measures, threat intelligence, and abuse report standardization aligns closely with our mission to create a safer Internet ecosystem. Additionally, we’re eager to engage with the Cybersecurity and Privacy Working Group and DNS Issues Working Group.
i2Coalition: Where does government policy interface with your work on a daily basis?
SM: Government policies directly influence how we approach incident response, data protection, and compliance. Regulations like GDPR, NIS2, and anti-abuse policies influence our workflows and client engagements. We actively monitor these policies to ensure alignment and to help our clients stay compliant while addressing cyber threats.