Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementSecurity Education & Training

The Good, Bad & Ugly About ChatGPT

Chatbot AI
Getty Images
Laurence Dutton/E+ via Getty Images
May 2, 2023

All of a sudden Chat GPT is all the rage. From high school students to professional marketers and everyone in between, the AI-based chatbot has taken the world by storm since it first appeared in November 2022. Its use in the security space hasn’t gotten a lot of press yet, but there are rumblings of how it might be used in a smart building environment — and the potential cyber-risks of doing so.

A recent article in Engineered Systems magazine looked at the use of ChatGPT in the automated building space and asked ChatGPT itself if it could be used in automated buildings. Here was its answer: 

ChatGPT: Yes, ChatGPT can be used in automated buildings as a conversational interface for controlling various systems and devices, such as lighting, temperature, security, and entertainment. For example, a user can interact with a chatbot powered by ChatGPT to request changes to the lighting or temperature in a room or to get information about the current status of the building’s systems. The chatbot can then interact with the building’s automation system to carry out the requested actions.

The article compared ChatGPT to an automated Alexa-like tool in a smart building scenario, which could in theory serve to further automate functions.

But there are definitely downsides, as seen in recent incidents experienced in Korea by Samsung. In April it was reported that there were three incidents of entering Samsung Electronics corporate information into ChatGPT, including one where an employee entered source code and asked for a solution, and another who entered program code and requested optimization.

Incidents like these could pose a huge cybersecurity risk. A Corvus webinar discussed the implications of these platforms, including the ability to create more believable phishing content, for example. There are also concerns about employees using ChatGPT for work tasks, as seen in the Samsung examples.

In all cases it is a good idea to develop guidelines of acceptable use for ChatGPT as soon as possible. 

“ChatGPT is probably the most exciting thing to come out in recent times,” Bugcrowd Founder and CTO Casey Ellis told Security Magazine. “The unfortunate downside is that an excited user is often also a less cautious one, and one that is more likely to make privacy and security related mistakes, both personally, and on behalf of their employers.”

One good rule of thumb is if you wouldn’t share the content you’re typing into ChatGPT with your direct competitor, then do not share it with ChatGPT, Melissa Bischoping Director of Endpoint Security Research at Tanium said to Security Magazine.

There are even cautions coming from the security integrator side of the industry. In the comments to the SDM 100 survey, Paladin Technologies shared this prediction and concern about the chatbot’s use in marketing: “AI like ChatGPT will disrupt the core interactions of our industry this year. When a buyer is asking you to ‘describe’ a process or a quality program, or even your delivery plan, a marginally passable response can be churned out by these tools in a few keystrokes. Paladin does not condone these tools; however, we suspect they will be used. If you’re going to use AI to support your technical writing, use it as a tool and don’t depend on it. Use AI to inspire content, not to create it. Strategies for direct marketing and cold call emails will also change. … As an end user, how do you distinguish interactions from an AI script? Our industry will be encouraged to leverage and enforce more reliance back to our roots: real human interaction.”

The bottom line: be aware of ChatGPT, set rules for your employees, be on the lookout for more AI-generated phishing and spam, and make sure your vendors are talking with you openly about how they are or aren’t utilizing this new tool.

KEYWORDS: artificial intelligence (AI) SDM magazine spam

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Thought bubbles

    Lessons from the Security 500 Conference: The good, the bad, and the ugly

    See More
  • Outsourcing Data: Don't Take a Fairytale Approach

    The good, the bad and the ugly: Standard contractual clauses after Schrems II

    See More
  • The Good, the Bad and the Very Ugly

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • The Database Hacker's Handboo

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing