Comparison Overview

CGI

VS

Samsung SDS

CGI

Worldwide, Worldwide, CA, 00
Last Update: 2026-03-21
Between 700 and 749

Insights you can act on. Founded in 1976, CGI is among the largest IT and business consulting services firms in the world. We are insights-driven and outcomes-focused to help accelerate returns on your investments. Across hundreds of locations worldwide, we provide comprehensive, scalable and sustainable IT and business consulting services that are informed globally and delivered locally. We value your opinions and welcome your comments and questions on our posts here on LinkedIn. Please keep a polite, professional and constructive tone. We remove comments containing objectionable language and derogatory views. We do not allow content that is unrelated to the subject, and we remove discriminatory and racist comments as well as spam and advertising. Note that content on this page contains general information regarding CGI’s services and initiatives and should not be considered direct business advice. To engage in a discussion with one of our experts, please make a request through https://www.cgi.com/en/contact-us

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 70,253
Subsidiaries: 0
12-month incidents
1
Known data breaches
1
Attack type number
1

Samsung SDS

Samsung SDS 125, Olympic-ro 35-gil, Songpa-gu, Seoul, 05510, KR
Last Update: 2026-03-21
Between 750 and 799

Samsung SDS provides cloud computing and digital logistics services. We build an optimized cloud environment with Samsung Cloud Platform specialized for businesses, provide all-in-one management service based on 38 years of expertise in each industry, and boost work efficiency and customer service with our SaaS solution, which proved successful in many use cases. Your only partner to present a reasonable answer to the complex challenge of digital transformation is Samsung SDS. Samsung SDS prides itself in leading IT innovation in Korea for over years while spending every year evolving to meet the needs of our clients and changing times. Our constant effort put us 21st in 2021 Gartner Global IT Service Business, and 1st in Manufacturing IT. We have also been named the 12th Most Valuable Global IT Services Brand by Brand Finance UK in 2023, showing how we have grown into a global top-tier company. Samsung SDS offers cloud-based digital transformation services with distinguished cloud technology and rich industry experience. We are recognized by global consultants such as Gartner, IDC, and Frost & Sullivan in their lists of Managed Cloud Services, Cloud Security, and AI Industry as a specialized cloud service company supporting clients' digital innovation.

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 14,835
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/cgi.jpeg
CGI
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/samsung-sds.jpeg
Samsung SDS
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
CGI
100%
Compliance Rate
0/4 Standards Verified
Samsung SDS
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs IT Services and IT Consulting Industry Average (This Year)

CGI has 40.12% fewer incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for Samsung SDS in 2026.

Incident History — CGI (X = Date, Y = Severity)

CGI cyber incidents detection timeline including parent company and subsidiaries

Incident History — Samsung SDS (X = Date, Y = Severity)

Samsung SDS cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/cgi.jpeg
CGI
Incidents

Date Detected: 3/2026
Type:Breach
Blog: Blog
https://images.rankiteo.com/companyimages/samsung-sds.jpeg
Samsung SDS
Incidents

No Incident

FAQ

Samsung SDS company demonstrates a stronger AI Cybersecurity Score compared to CGI company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

CGI company has historically faced a number of disclosed cyber incidents, whereas Samsung SDS company has not reported any.

In the current year, CGI company has reported more cyber incidents than Samsung SDS company.

Neither Samsung SDS company nor CGI company has reported experiencing a ransomware attack publicly.

CGI company has disclosed at least one data breach, while the other Samsung SDS company has not reported such incidents publicly.

Neither Samsung SDS company nor CGI company has reported experiencing targeted cyberattacks publicly.

Neither CGI company nor Samsung SDS company has reported experiencing or disclosing vulnerabilities publicly.

Neither CGI nor Samsung SDS holds any compliance certifications.

Neither company holds any compliance certifications.

Neither CGI company nor Samsung SDS company has publicly disclosed detailed information about the number of their subsidiaries.

CGI company employs more people globally than Samsung SDS company, reflecting its scale as a IT Services and IT Consulting.

Neither CGI nor Samsung SDS holds SOC 2 Type 1 certification.

Neither CGI nor Samsung SDS holds SOC 2 Type 2 certification.

Neither CGI nor Samsung SDS holds ISO 27001 certification.

Neither CGI nor Samsung SDS holds PCI DSS certification.

Neither CGI nor Samsung SDS holds HIPAA certification.

Neither CGI nor Samsung SDS holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A flaw has been found in wandb OpenUI up to 1.0. This affects the function create_share/get_share of the file backend/openui/server.py of the component HTMLAnnotator Component. Executing a manipulation of the argument ID can lead to HTML injection. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in QDOCS Smart School Management System up to 7.2. The impacted element is an unknown function of the file /admin/enquiry of the component Admission Enquiry Module. Performing a manipulation of the argument Note results in cross site scripting. The attack is possible to be carried out remotely.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

The Ultimate Member plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.2. This is due to the '{usermeta:password_reset_link}' template tag being processed within post content via the '[um_loggedin]' shortcode, which generates a valid password reset token for the currently logged-in user viewing the page. This makes it possible for authenticated attackers, with Contributor-level access and above, to craft a malicious pending post that, when previewed by an Administrator, generates a password reset token for the Administrator and exfiltrates it to an attacker-controlled server, leading to full account takeover.

Risk Information
cvss3
Base: 8.0
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Description

LibJWT is a C JSON Web Token Library. Starting in version 3.0.0 and prior to version 3.3.0, the JWK parsing for RSA-PSS did not protect against a NULL value when expecting to parse JSON string values. A specially crafted JWK file could exploit this behavior by using integers in places where the code expected a string. This was fixed in v3.3.0. A workaround is available. Users importing keys through a JWK file should not do so from untrusted sources. Use the `jwk2key` tool to check for validity of a JWK file. Likewise, if possible, do not use JWK files with RSA-PSS keys.

Risk Information
cvss4
Base: 5.8
Severity: HIGH
CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:A/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Starting in version 2.0.39 and prior to version 3.0.25, a prototype pollution vulnerability exists in the `parse_str` function of the npm package locutus. An attacker can pollute `Object.prototype` by overriding `RegExp.prototype.test` and then passing a crafted query string to `parse_str`, bypassing the prototype pollution guard. This vulnerability stems from an incomplete fix for CVE-2026-25521. The CVE-2026-25521 patch replaced the `String.prototype.includes()`-based guard with a `RegExp.prototype.test()`-based guard. However, `RegExp.prototype.test` is itself a writable prototype method that can be overridden, making the new guard bypassable in the same way as the original — trading one hijackable built-in for another. Version 3.0.25 contains an updated fix.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X