Comparison Overview

UBS

VS

American Express

UBS

Postbox, None, Zurich, None, CH, 8001
Last Update: 2025-12-09
Between 750 and 799

From gaining new experiences in different roles to acquiring fresh knowledge and skills – at UBS we believe that you should never stop growing and learning because life never stops teaching. We know that it's our people – with their unique backgrounds, skills, experience levels and interests – who drive our ongoing success. Ready to be part of #teamUBS and make an impact? Find out more at ubs.com/careers. UBS works with individuals, families, institutions, and corporations around the world to help answer some of life's questions – whether through award winning wealth management advisory, investment banking and asset management expertise, or private and corporate banking services in Switzerland*. In June 2023, Credit Suisse became a UBS Group company. With our large and diverse team operating internationally, we have a presence in all major financial centers in more than 50 countries. Although we all come from different backgrounds and specializations, two things unite us: the conviction that we’re stronger together, and the will and curiosity to constantly innovate. That’s the key to us unlocking our full potential (and what we look for in everyone who joins us). It’s also why we’re regularly recognized as an attractive employer.* * Our awards https://www.ubs.com/awards Social Media Legal Terms: http://www.ubs.com/social-legal

NAICS: 52
NAICS Definition: Finance and Insurance
Employees: 118,118
Subsidiaries: 6
12-month incidents
1
Known data breaches
0
Attack type number
1

American Express

World Financial Center, 200 Vesey Street, None, New York, NY, US, 10285
Last Update: 2025-12-11

At American Express, we know that with the right backing, people and businesses have the power to progress in incredible ways. Whether we’re supporting our customers’ financial confidence to move ahead, taking commerce to new heights, or encouraging people to explore the world, our colleagues are constantly striving to uphold our powerful backing promise to our customers and each other every day. These beliefs have been our North Star for 170 years as our business transformed – from helping evacuate travelers during World Wars, to ensuring the safety of our customers’ funds during the Great Depression in the U.S., to creating the Shop Small® movement to help small businesses recover from the Financial Crisis, to providing aid to communities impacted by many natural disasters and so much more. For generations, the key to our success has been the determination and resilience of our American Express colleagues. Now, as a globally integrated payments company, we work together to provide customers with access to products, insights and world-class experiences that enrich lives and build business success. Join us and let’s lead the way together. Learn more about us at: https://www.americanexpress.com/careers https://www.americanexpress.com/ https://www.facebook.com/AmericanExpressUS https://www.instagram.com/americanexpress/ https://twitter.com/americanexpress https://www.youtube.com/user/AmericanExpress See our community guidelines at: https://www.americanexpress.com/en-us/company/community-guidelines/ If you have a customer service issue or question, please visit www.americanexpress.com/contactus

NAICS: 52
NAICS Definition: Finance and Insurance
Employees: 79,764
Subsidiaries: 2
12-month incidents
1
Known data breaches
49
Attack type number
2

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/ubs.jpeg
UBS
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/american-express.jpeg
American Express
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
UBS
100%
Compliance Rate
0/4 Standards Verified
American Express
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Financial Services Industry Average (This Year)

UBS has 20.48% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs Financial Services Industry Average (This Year)

American Express has 20.48% more incidents than the average of same-industry companies with at least one recorded incident.

Incident History — UBS (X = Date, Y = Severity)

UBS cyber incidents detection timeline including parent company and subsidiaries

Incident History — American Express (X = Date, Y = Severity)

American Express cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/ubs.jpeg
UBS
Incidents

Date Detected: 6/2025
Type:Ransomware
Attack Vector: Third-party supplier compromise
Motivation: Data exfiltration and potential ransom demand
Blog: Blog
https://images.rankiteo.com/companyimages/american-express.jpeg
American Express
Incidents

Date Detected: 2/2025
Type:Breach
Blog: Blog

Date Detected: 7/2022
Type:Cyber Attack
Blog: Blog

Date Detected: 01/2021
Type:Breach
Attack Vector: Unknown
Blog: Blog

FAQ

UBS company demonstrates a stronger AI Cybersecurity Score compared to American Express company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

American Express company has faced a higher number of disclosed cyber incidents historically compared to UBS company.

In the current year, American Express and UBS have reported a similar number of cyber incidents.

UBS company has confirmed experiencing a ransomware attack, while American Express company has not reported such incidents publicly.

American Express company has disclosed at least one data breach, while UBS company has not reported such incidents publicly.

American Express company has reported targeted cyberattacks, while UBS company has not reported such incidents publicly.

Neither UBS company nor American Express company has reported experiencing or disclosing vulnerabilities publicly.

Neither UBS nor American Express holds any compliance certifications.

Neither company holds any compliance certifications.

UBS company has more subsidiaries worldwide compared to American Express company.

UBS company employs more people globally than American Express company, reflecting its scale as a Financial Services.

Neither UBS nor American Express holds SOC 2 Type 1 certification.

Neither UBS nor American Express holds SOC 2 Type 2 certification.

Neither UBS nor American Express holds ISO 27001 certification.

Neither UBS nor American Express holds PCI DSS certification.

Neither UBS nor American Express holds HIPAA certification.

Neither UBS nor American Express holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X