<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Ludovic DEGRE, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/ludovic-degre/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 29 Apr 2026 15:56:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Ludovic DEGRE, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Electric mobility: charging infrastructure evolution, between energy optimization and emerging cybersecurity challenges</title>
		<link>https://www.riskinsight-wavestone.com/en/2026/04/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2026/04/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges/#respond</comments>
		
		<dc:creator><![CDATA[Ludovic DEGRE]]></dc:creator>
		<pubDate>Wed, 29 Apr 2026 15:56:17 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=29885</guid>

					<description><![CDATA[<p>Electric mobility is experiencing rapid growth in France and across Europe: in January 2026, registrations of fully electric vehicles in France increased by more than 50% compared with January 2025, bringing their market share to nearly one third of total vehicle sales. This trajectory confirms a structural transformation of...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/04/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges/">Electric mobility: charging infrastructure evolution, between energy optimization and emerging cybersecurity challenges</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><b><span data-contrast="auto">Electric mobility is experiencing rapid growth in France and across Europe:</span></b><span data-contrast="auto"> in January 2026, registrations of fully electric vehicles in France increased by more than 50% compared with January 2025, bringing their market share to nearly one third of total vehicle sales. This trajectory confirms a structural transformation of the automotive sector, which appears to be entering a phase of massive electrification, particularly for light-duty vehicles. This momentum is fully aligned with the orientations set out in France’s Multiannual Energy Program (PPE), which translates national ambitions for the energy transition into operational targets. As such, the growth of electric vehicles can no longer</span><b><span data-contrast="auto"> </span></b><span data-contrast="auto">be considered short-term, but rather as a trajectory set to strengthen further.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><b><span data-contrast="auto">This trajectory, however, relies on the availability of a dense, reliable, and properly dimensioned charging network across the entire territory.</span></b><span data-contrast="auto"> Whether for public charging (motorways, public roads, shopping centers) or private charging (homes, businesses), this infrastructure forms the backbone of the electric mobility ecosystem. At the heart of this ecosystem, Charging Point Operators (CPOs) play a structuring role, being responsible for the installation, operation, and maintenance of charging stations.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Cyber risk is now emerging as a major threat to charging infrastructures, in a context where electrical networks are increasingly targeted by cybercriminal groups and state-sponsored actors</span><span data-contrast="auto">1</span><span data-contrast="auto">2</span><span data-contrast="auto">.  For CPOs, this reality is a game changer: mastering cyber risk becomes a prerequisite for service reliability and ecosystem protection. As charging networks expand and grow more complex, </span><b><span data-contrast="auto">cybersecurity challenges become central: data protection, service continuity, securing financial flows, and managing third</span></b>‑<b><span data-contrast="auto">party risks.</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">This article is part of a series of three papers exploring three structuring challenges faced by electric mobility stakeholders, with the aim of analyzing their implications from a cybersecurity perspective.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1 aria-level="1"><span data-contrast="none">Rethinking charging infrastructure: balancing operational requirements and emerging cyber constraints</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:0}"> </span></h1>
<p><span data-contrast="auto">In the context of strong growth combined with the gradual structuring of the market, </span><b><span data-contrast="auto">CPOs are facing a demanding economic equation</span></b><span data-contrast="auto">. The deployment of charging infrastructures requires significant upfront investments – land acquisition, grid connection, purchase and installation of charging points, supervision, and maintenance – while utilization rates remain heterogeneous across regions and site typologies. Added to this are the volatility of electricity prices, increasing competitive pressure, and the rapid evolution of technological standards, which require regular upgrades.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">As public subsidies tend to be streamlined and investors increasingly expect clearer profitability trajectories, optimizing the economic performance of assets becomes imperative. </span><b><span data-contrast="auto">Maximizing availability rates, fine</span></b>‑<b><span data-contrast="auto">tuning operating costs, improving utilization levels, and diversifying revenue streams are no longer secondary levers, but essential conditions for the long</span></b>‑<b><span data-contrast="auto">term sustainability of CPOs’ business models.</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Charging infrastructures, as designed today, illustrated in Figure</span><span data-contrast="auto"> </span><span data-contrast="auto">1, generally rely on static power control managed by a central supervision system, the Charging Point Management System (CPMS). This operating model does not allow, or significantly limits, the CPO’s ability to adapt power distribution in real time to usage patterns and site-specific constraints.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: center;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-29868 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/borne_ev_EN1.png" alt="" width="679" height="262" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/borne_ev_EN1.png 679w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/borne_ev_EN1-437x169.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/borne_ev_EN1-71x27.png 71w" sizes="(max-width: 679px) 100vw, 679px" /></span><em> Figure 1: Architecture of a conventional charging infrastructure </em></p>
<p><span data-contrast="auto">Therefore, several optimization levers can be implemented.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">First, it is possible to enhance the site’s energy flexibility, particularly to support fast charging without having to oversize the grid connection. To achieve this, the deployment of a </span><b><span data-contrast="auto">Battery Energy Storage System (BESS)</span></b><span data-contrast="auto"> proves to be an effective solution: this stationary battery storage acts as a buffer, capable of storing energy when it is available and releasing it during peak demand, thereby improving the site’s stability and resilience.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">The next step consists in integrating local, low</span>‑<span data-contrast="auto">carbon energy production directly at charging sites, making it available for immediate use or storage through the addition of </span><b><span data-contrast="auto">photovoltaic systems</span></b><span data-contrast="auto">. Solar panels, installed on rooftops or canopies, provide this renewable generation layer. Their effectiveness, however, relies on their integration with appropriate control and storage systems, ensuring the environmental coherence of electric mobility.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">Finally, to enable the proper integration of these energy production and storage assets at charging sites, a global control system has emerged: the </span><b><span data-contrast="auto">Energy Management System (EMS)</span></b><span data-contrast="auto">. This system supervises and adjusts energy flows on site in real time, aligning them with demand, local constraints, and grid connection agreements. It controls power distribution, anticipates variable charging demand, and maximizes the use of local energy production, thereby transforming a conventional electrical installation into a dynamic and intelligent system.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><b><span data-contrast="auto">Thanks to intelligent energy management via an EMS, battery storage, and the integration of solar generation, this architecture (illustrated in Figure</span></b><b><span data-contrast="auto"> </span></b><b><span data-contrast="auto">2) enables performance optimization while keeping costs under control and thus represents a key step towards the next phase of the energy transition.</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><img decoding="async" class="size-full wp-image-29866 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/borne_ev_EN2.png" alt="" width="903" height="583" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/borne_ev_EN2.png 903w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/borne_ev_EN2-296x191.png 296w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/borne_ev_EN2-60x39.png 60w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/borne_ev_EN2-768x496.png 768w" sizes="(max-width: 903px) 100vw, 903px" /></p>
<p style="text-align: center;"><i><span data-contrast="none">Figure </span></i><i><span data-contrast="none">2</span></i><i><span data-contrast="none">: Architecture of a next-generation charging infrastructure</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:360,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">In the remainder of this article, we will focus on </span><b><span data-contrast="auto">three new sources of cybersecurity risk</span></b><span data-contrast="auto"> introduced by the integration of Energy Management Systems (EMS) into CPOs’ charging infrastructures.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<h2 aria-level="2"><span data-contrast="none">The EMS: an optimization lever that has become a critical risk point</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h2>
<p><span data-contrast="auto">EMS have become a key component of charging infrastructures, enabling CPOs to finely optimize power management and charging strategies. This central role makes EMS a </span><b><span data-contrast="auto">critical point in terms of cybersecurity </span></b><span data-contrast="auto">&#8211; their compromise can result in major operational impacts for a CPO:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:0}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Unavailability </span></b><span data-contrast="auto">of a part of the charging stations.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}"> </span></li>
<li><b><span data-contrast="auto">Degradation </span></b><span data-contrast="auto">of energy optimization, resulting in direct financial impacts.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}"> </span></li>
<li><b><span data-contrast="auto">Load imbalances</span></b><span data-contrast="auto"> that may lead to service limitations or outages at site level.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}"> </span></li>
</ul>
<p><span data-contrast="auto">Beyond these incident scenarios, the introduction of EMS also fundamentally reshapes the risk landscape to which charging infrastructures are exposed.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 aria-level="2"><span data-contrast="none">Increased reliance on third</span>‑<span data-contrast="none">party infrastructures</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h2>
<p><span data-contrast="auto">The deployment of EMS solutions is most often based on </span><b><span data-contrast="auto">turnkey offerings</span></b><span data-contrast="auto">, combined with </span><b><span data-contrast="auto">vendor</span></b>‑<b><span data-contrast="auto">operated management platforms hosted in cloud environments</span></b><span data-contrast="auto">. These platforms enable CPOs to centrally manage their entire EMS fleet and support a range of use cases, including optimization of available power, performance monitoring, and remote control of charging strategies.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:0}"> </span></p>
<p><b><span data-contrast="auto">This architecture, however, introduces a direct dependency on third</span></b>‑<b><span data-contrast="auto">party infrastructures that lie outside the CPO’s perimeter of control. As a result, it expands the attack surface and increases CPOs’ exposure to supply</span></b>‑<b><span data-contrast="auto">chain</span></b>‑<b><span data-contrast="auto">related risks.</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:0}"> </span></p>
<p><span data-contrast="auto">This issue is further compounded by the fact that these vendors are often small, highly specialized players whose level of cybersecurity maturity can be heterogeneous. A compromise of these platforms may therefore lead to widespread impacts, potentially resulting in the unavailability of a significant share of the EMS fleet operated by a CPO and, by extension, a risk of charging station outages.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:0}"> </span></p>
<p><span data-contrast="auto">In addition, the compromise of EMS cloud platforms may also lead to breaches of data confidentiality, as it could enable an attacker to collect sensitive operational information, which could notably be exploited for espionage purposes, including:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240}"> </span></p>
<ul>
<li><span data-contrast="auto">Detailed mapping of charging sites and deployed energy assets.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559740&quot;:278,&quot;335559991&quot;:357}"> </span></li>
<li><span data-contrast="auto">Energy management strategies, revealing the optimization logics implemented by the CPO.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559740&quot;:278,&quot;335559991&quot;:357}"> </span></li>
<li><span data-contrast="auto">Consumption and power data across the CPO’s entire portfolio of sites.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559740&quot;:278,&quot;335559991&quot;:357}"> </span></li>
</ul>
<h2 aria-level="2"><span data-contrast="none">Local communications relying on weakly secured protocols</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h2>
<p><b><span data-contrast="auto">These new architectures also extend the attack surface at the local network level, particularly through communications with energy-related equipment, which still largely rely on weakly secured industrial protocols.</span></b><span data-contrast="auto"> </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Unlike exchanges between supervision systems (CPMS) and charging stations, which benefit from the standardization provided by OCPP, communications between the EMS and other components (BESS, charging points, etc.) still predominantly rely on Modbus.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Originally designed for closed industrial environments, this protocol does not natively implement security mechanisms such as authentication or encryption. In practice, each EMS vendor deploys its own protective measures, resulting in heterogeneous security levels. For CPOs, this diversity complicates the securing of the fleet and may introduce new exploitable weak points within the local network.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1 aria-level="1"><span data-contrast="none">Levers to secure next</span>‑<span data-contrast="none">generation charging infrastructure</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:0}"> </span></h1>
<p><span data-contrast="auto">Securing next</span>‑<span data-contrast="auto">generation charging infrastructures relies on a structured approach that makes it possible to reconcile operational performance with effective cybersecurity risk management.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p aria-level="2"><span data-contrast="none">Ensuring the resilience of charging architecture</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></p>
<p><span data-contrast="auto">The evolution of charging infrastructures introduces a single point of failure for CPOs: the EMS. To address this risk, it is necessary to design resilient architectures capable of maintaining continuity even in the event of an EMS failure. This can notably be achieved through:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><span data-contrast="auto">The implementation </span><b><span data-contrast="auto">of monitoring and alerting mechanisms</span></b><span data-contrast="auto">, enabling rapid detection of EMS failures and activation of fallback mechanisms.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:240,&quot;335559991&quot;:357}"> </span></li>
<li><span data-contrast="auto">The deployment of </span><b><span data-contrast="auto">degraded operating modes</span></b><span data-contrast="auto">, allowing charging stations to continue operating even in the event of EMS unavailability.</span><span data-ccp-props="{&quot;201341983&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:300}"> </span></li>
<li><span data-contrast="auto">The definition of business continuity and disaster recovery strategies that explicitly include EMS failure scenarios.</span><span data-ccp-props="{&quot;201341983&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:300}"> </span></li>
</ul>
<h2 aria-level="2"><span data-contrast="none">Securing dependencies on unmanaged third</span><span data-contrast="none">&#8211;</span><span data-contrast="none">party infrastructures</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h2>
<p><span data-contrast="auto">The evolution of charging infrastructure architectures requires CPOs to address both supply</span>‑<span data-contrast="auto">chain</span>‑<span data-contrast="auto">related risks and risks inherent to the interconnection between the CPMS and EMS vendors’ cloud infrastructures.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">To reduce supply</span>‑<span data-contrast="auto">chain risks, CPOs must implement robust vendor qualification processes, including in particular:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><span data-contrast="auto">Assessment of the vendor’s </span><b><span data-contrast="auto">cybersecurity maturity level.</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:240,&quot;335559991&quot;:357}"> </span></li>
<li><span data-contrast="auto">Evaluation of product security, notably through </span><b><span data-contrast="auto">penetration testing</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:240,&quot;335559991&quot;:357}"> </span></li>
<li><span data-contrast="auto">Contractual governance of supplier relationships, including, where appropriate, the implementation of </span><b><span data-contrast="auto">Security Assurance Plans (SAPs)</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:240,&quot;335559991&quot;:357}"> </span></li>
</ul>
<p><span data-contrast="auto">Beyond supply</span>‑<span data-contrast="auto">chain risk management, CPOs must also account for the risks introduced by the interconnection of their infrastructure with EMS vendors’ environments (EMS cloud). Securing these interconnections requires a strong control of data flows between the CPO infrastructure and these external environments. This can be achieved through three main levers:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><span data-contrast="auto">Implementing </span><b><span data-contrast="auto">traffic filtering and control mechanisms</span></b><span data-contrast="auto"> between the local charging infrastructure network and external networks, to restrict communications strictly to legitimate third</span>‑<span data-contrast="auto">party infrastructures.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:240,&quot;335559991&quot;:357}"> </span></li>
<li><span data-contrast="auto">Formalizing </span><b><span data-contrast="auto">secure architectural standards</span></b><span data-contrast="auto"> and ensuring their effective implementation during EMS deployment in the field, guaranteeing a consistent application of cybersecurity best practices.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:240,&quot;335559991&quot;:357}"> </span></li>
<li><span data-contrast="auto">Implementing </span><b><span data-contrast="auto">isolation mechanisms</span></b><span data-contrast="auto"> to contain potential EMS cloud failures and prevent their propagation across the entire charging infrastructure fleet.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:240,&quot;335559991&quot;:357}"> </span></li>
</ul>
<h2 aria-level="2"><span data-contrast="none">Securing communications relying on industrial protocols</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h2>
<p><span data-contrast="auto">Communications between EMS and energy</span>‑<span data-contrast="auto">related equipment, particularly BESS, still largely rely on industrial protocols such as Modbus, which do not provide native security mechanisms. In this context, securing these exchanges cannot rely on the protocols themselves, but must instead be addressed at the infrastructure architecture level.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">This notably involves:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Implementing strict network segmentation within the local network</span></b><span data-contrast="auto">, isolating EMS, BESS, and other components to limit exposure surfaces.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:276,&quot;335559991&quot;:357}"> </span></li>
<li><b><span data-contrast="auto">Applying fine</span></b>‑<b><span data-contrast="auto">grained control over communications</span></b><span data-contrast="auto"> by locally restricting data flows to strictly necessary exchanges (filtering, whitelisting, limitation of authorized commands).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:276,&quot;335559991&quot;:357}"> </span></li>
<li><b><span data-contrast="auto">Deploying communication monitoring mechanisms</span></b><span data-contrast="auto"> to detect abnormal or unauthorized behavior.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:276,&quot;335559991&quot;:357}"> </span></li>
</ul>
<h2 aria-level="2"><span data-contrast="none">Establishing a structured cybersecurity governance</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h2>
<p><span data-contrast="auto">To address the diversity of components and infrastructures operated across their charging networks, it is essential for CPOs to structure their environment around clear governance, including in particular:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Clarification of</span></b><span data-contrast="auto"> </span><b><span data-contrast="auto">cyber roles and responsibilities</span></b><span data-contrast="auto"> across the entire value chain (CPOs, suppliers, service providers, etc.).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></li>
<li><span data-contrast="auto">Definition of security standards applicable to all projects and suppliers, ensuring overall architectural consistency</span><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:240,&quot;335559740&quot;:240}"> </span></li>
</ul>
<p><span data-contrast="auto">By combining rigorous supplier risk management, a solid governance framework, and strict control of data flows, CPOs can fully leverage the operational gains offered by EMS while securing their infrastructure in a sustainable manner.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:240}"> </span></p>
<h1 aria-level="1"><span data-contrast="none">Optimizing without compromising: the challenge of charging infrastructure</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:0}"> </span></h1>
<p><span data-contrast="auto">To conclude, the rise of Energy Management Systems (EMS) is profoundly transforming charging infrastructures, providing essential optimization levers while also introducing new cybersecurity risks. For CPOs, the challenge is no longer limited to deploying these solutions but extends to securing them within a comprehensive approach that encompasses supplier risk management, the definition of secure architectures, and the establishment of structured cybersecurity governance. In this context, </span><b><span data-contrast="auto">cybersecurity is now emerging as a prerequisite for the sustainable performance of charging infrastructures.</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/04/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges/">Electric mobility: charging infrastructure evolution, between energy optimization and emerging cybersecurity challenges</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2026/04/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
