{"id":29885,"date":"2026-04-29T16:56:17","date_gmt":"2026-04-29T15:56:17","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=29885"},"modified":"2026-04-29T16:56:18","modified_gmt":"2026-04-29T15:56:18","slug":"electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/","title":{"rendered":"Electric mobility: charging infrastructure evolution, between energy optimization and emerging cybersecurity challenges"},"content":{"rendered":"\n<p><b><span data-contrast=\"auto\">Electric mobility is experiencing rapid growth in France and across\u00a0Europe:<\/span><\/b><span data-contrast=\"auto\">\u00a0in January 2026, registrations of\u00a0fully\u00a0electric vehicles in France increased by more than 50% compared with January 2025, bringing their market share to\u00a0nearly one\u00a0third of total vehicle sales. This trajectory\u00a0confirms a structural\u00a0transformation\u00a0of the automotive sector, which\u00a0appears to be\u00a0entering a phase of massive\u00a0electrification, particularly for light-duty vehicles.\u00a0This momentum is fully aligned with the orientations set out in France\u2019s Multiannual Energy Program (PPE), which translates national ambitions for the energy transition into operational targets. As such, the growth of electric vehicles can no longer<\/span><b><span data-contrast=\"auto\">\u00a0<\/span><\/b><span data-contrast=\"auto\">be considered\u00a0short-term, but rather as a trajectory set to strengthen further.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">This trajectory, however, relies on the availability of a dense, reliable, and properly dimensioned charging network across the entire territory.<\/span><\/b><span data-contrast=\"auto\">\u00a0Whether for public charging (motorways, public roads, shopping\u00a0centers) or private charging (homes, businesses), this infrastructure forms the backbone of the electric mobility ecosystem. At the heart of this ecosystem, Charging Point Operators (CPOs) play a structuring role,\u00a0being responsible for\u00a0the installation, operation, and maintenance of charging stations.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Cyber risk\u00a0is\u00a0now\u00a0emerging\u00a0as\u00a0a major threat to charging infrastructures, in a context where electrical networks are increasingly targeted by cybercriminal groups and state-sponsored\u00a0actors<\/span><span data-contrast=\"auto\">1<\/span><span data-contrast=\"auto\">2<\/span><span data-contrast=\"auto\">.\u00a0\u00a0For CPOs, this reality is a game changer: mastering cyber risk becomes a prerequisite for service reliability and ecosystem protection. As charging networks expand and grow more complex,\u00a0<\/span><b><span data-contrast=\"auto\">cybersecurity challenges become\u00a0central:\u00a0data protection, service continuity, securing financial flows, and managing third<\/span><\/b>\u2011<b><span data-contrast=\"auto\">party risks.<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This article is part of a series of three papers exploring three structuring challenges faced by electric mobility stakeholders, with the aim of analyzing their implications from a cybersecurity perspective.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h1 aria-level=\"1\"><span data-contrast=\"none\">Rethinking charging infrastructure: balancing operational requirements and emerging cyber constraints<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h1>\n<p><span data-contrast=\"auto\">In the context of\u00a0strong growth\u00a0combined with the gradual\u00a0structuring\u00a0of the market,\u00a0<\/span><b><span data-contrast=\"auto\">CPOs are facing a demanding economic equation<\/span><\/b><span data-contrast=\"auto\">. The deployment of charging infrastructures requires significant upfront investments\u00a0\u2013\u00a0land acquisition, grid connection, purchase and installation of charging points, supervision, and maintenance\u00a0\u2013\u00a0while\u00a0utilization\u00a0rates\u00a0remain\u00a0heterogeneous across regions and site typologies. Added to this are the volatility of electricity prices, increasing competitive pressure, and the rapid evolution of technological standards, which require regular upgrades.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As public subsidies tend to be streamlined and investors increasingly expect clearer profitability trajectories,\u00a0optimizing\u00a0the economic performance of assets becomes imperative.\u00a0<\/span><b><span data-contrast=\"auto\">Maximizing\u00a0availability rates, fine<\/span><\/b>\u2011<b><span data-contrast=\"auto\">tuning operating costs, improving\u00a0utilization\u00a0levels, and diversifying revenue streams are no longer secondary levers, but essential conditions for the long<\/span><\/b>\u2011<b><span data-contrast=\"auto\">term sustainability of CPOs\u2019 business models.<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Charging infrastructures, as designed today, illustrated in Figure<\/span><span data-contrast=\"auto\">\u202f<\/span><span data-contrast=\"auto\">1,\u00a0generally rely\u00a0on static power control managed by a central supervision system, the Charging Point Management System (CPMS). This operating model\u00a0does not allow, or significantly limits, the CPO\u2019s ability to adapt power distribution in real time to usage patterns and site-specific constraints.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-29868 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/04\/borne_ev_EN1.png\" alt=\"\" width=\"679\" height=\"262\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/04\/borne_ev_EN1.png 679w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/04\/borne_ev_EN1-437x169.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/04\/borne_ev_EN1-71x27.png 71w\" sizes=\"auto, (max-width: 679px) 100vw, 679px\" \/><\/span><em> Figure 1: Architecture of a conventional charging infrastructure\u00a0<\/em><\/p>\n<p><span data-contrast=\"auto\">Therefore,\u00a0several optimization\u00a0levers\u00a0can be implemented.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">First, it is possible to enhance the site\u2019s energy flexibility, particularly to support fast charging without having to oversize the grid connection. To achieve this, the deployment of a\u00a0<\/span><b><span data-contrast=\"auto\">Battery Energy Storage System (BESS)<\/span><\/b><span data-contrast=\"auto\">\u00a0proves to be an effective solution: this stationary battery storage acts as a buffer, capable of storing energy when it is available and releasing it during peak demand, thereby improving the site\u2019s stability and resilience.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The next step consists in integrating local, low<\/span>\u2011<span data-contrast=\"auto\">carbon energy production directly at charging sites, making it available for immediate use or storage through the addition of\u00a0<\/span><b><span data-contrast=\"auto\">photovoltaic systems<\/span><\/b><span data-contrast=\"auto\">. Solar panels, installed on rooftops or canopies, provide this renewable generation layer. Their effectiveness, however, relies on their integration with\u00a0appropriate control\u00a0and storage systems, ensuring the environmental coherence of electric mobility.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Finally, to enable the proper integration of these energy production and storage assets at charging sites, a global control system has\u00a0emerged: the\u00a0<\/span><b><span data-contrast=\"auto\">Energy Management System (EMS)<\/span><\/b><span data-contrast=\"auto\">. This system supervises and adjusts energy flows on site in real time, aligning them with demand, local constraints, and grid connection agreements. It controls power distribution,\u00a0anticipates\u00a0variable charging demand, and maximizes the use of local energy production, thereby transforming a conventional electrical installation into a dynamic and intelligent system.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Thanks to intelligent energy management via an EMS, battery storage, and the integration of solar generation, this architecture\u00a0(illustrated in Figure<\/span><\/b><b><span data-contrast=\"auto\">\u202f<\/span><\/b><b><span data-contrast=\"auto\">2)\u00a0enables performance optimization while keeping costs under\u00a0control and\u00a0thus\u00a0represents\u00a0a key step towards the next phase of the energy transition.<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-29866 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/04\/borne_ev_EN2.png\" alt=\"\" width=\"903\" height=\"583\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/04\/borne_ev_EN2.png 903w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/04\/borne_ev_EN2-296x191.png 296w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/04\/borne_ev_EN2-60x39.png 60w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/04\/borne_ev_EN2-768x496.png 768w\" sizes=\"auto, (max-width: 903px) 100vw, 903px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure\u00a0<\/span><\/i><i><span data-contrast=\"none\">2<\/span><\/i><i><span data-contrast=\"none\">:\u00a0Architecture\u00a0of a next-generation charging\u00a0infrastructure<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:360,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In the\u00a0remainder\u00a0of this article, we will focus on\u00a0<\/span><b><span data-contrast=\"auto\">three new sources of cybersecurity risk<\/span><\/b><span data-contrast=\"auto\">\u00a0introduced by the integration of Energy Management Systems (EMS) into CPOs\u2019 charging infrastructures.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">The\u00a0EMS:\u00a0an optimization lever that has become a critical risk point<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">EMS\u00a0have\u00a0become a key\u00a0component\u00a0of charging infrastructures, enabling CPOs to finely\u00a0optimize\u00a0power\u00a0management\u00a0and charging strategies. This\u00a0central role\u00a0makes EMS a\u00a0<\/span><b><span data-contrast=\"auto\">critical\u00a0point in terms of\u00a0cybersecurity\u00a0<\/span><\/b><span data-contrast=\"auto\">&#8211; their compromise can result in major operational impacts for a CPO:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:0}\">\u00a0<\/span><\/p>\n<ul>\n<li><b><span data-contrast=\"auto\">Unavailability\u00a0<\/span><\/b><span data-contrast=\"auto\">of a part of the\u00a0charging\u00a0stations.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Degradation\u00a0<\/span><\/b><span data-contrast=\"auto\">of energy\u00a0optimization, resulting in direct financial\u00a0impacts.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Load imbalances<\/span><\/b><span data-contrast=\"auto\">\u00a0that may lead to service limitations or outages at site level.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Beyond these incident scenarios, the introduction of EMS also fundamentally reshapes the risk landscape to which charging infrastructures are exposed.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Increased\u00a0reliance\u00a0on\u00a0third<\/span>\u2011<span data-contrast=\"none\">party\u00a0infrastructures<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The deployment of EMS solutions is most often based on\u00a0<\/span><b><span data-contrast=\"auto\">turnkey offerings<\/span><\/b><span data-contrast=\"auto\">, combined with\u00a0<\/span><b><span data-contrast=\"auto\">vendor<\/span><\/b>\u2011<b><span data-contrast=\"auto\">operated management platforms hosted in cloud environments<\/span><\/b><span data-contrast=\"auto\">. These platforms enable CPOs to centrally manage their entire EMS fleet and support a range of use cases,\u00a0including optimization of available power, performance monitoring, and remote control of charging strategies.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:0}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">This architecture, however, introduces a direct dependency on third<\/span><\/b>\u2011<b><span data-contrast=\"auto\">party infrastructures that lie outside the CPO\u2019s perimeter of control. As a result, it expands the attack surface and increases CPOs\u2019 exposure to supply<\/span><\/b>\u2011<b><span data-contrast=\"auto\">chain<\/span><\/b>\u2011<b><span data-contrast=\"auto\">related risks.<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:0}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This issue is further compounded by the fact that these vendors are often small, highly specialized players whose level of cybersecurity maturity can be heterogeneous. A compromise of these platforms may therefore lead to widespread impacts, potentially resulting in the unavailability of a significant share of the EMS fleet\u00a0operated\u00a0by a CPO and, by extension, a risk of charging station outages.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:0}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In addition, the compromise of EMS cloud platforms may also lead to breaches of data confidentiality, as it could enable an attacker to collect sensitive operational information, which could notably be exploited for espionage purposes, including:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">Detailed mapping of charging sites and deployed energy\u00a0assets.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559740&quot;:278,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Energy management\u00a0strategies,\u00a0revealing\u00a0the optimization logics implemented by the\u00a0CPO.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559740&quot;:278,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Consumption and power data across the CPO\u2019s entire portfolio of sites.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559740&quot;:278,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Local communications\u00a0relying\u00a0on\u00a0weakly\u00a0secured\u00a0protocols<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">These new architectures also extend\u00a0the attack surface at the local network level, particularly through communications with energy-related equipment, which still largely rely on weakly secured industrial protocols.<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Unlike exchanges between supervision systems (CPMS) and charging stations, which\u00a0benefit\u00a0from the standardization provided by OCPP, communications between the EMS and other components (BESS, charging points, etc.) still predominantly rely on Modbus.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Originally designed for\u00a0closed\u00a0industrial environments, this protocol does not natively implement security mechanisms such as authentication or encryption. In practice, each EMS vendor\u00a0deploys\u00a0its own protective measures, resulting in heterogeneous security levels. For CPOs, this diversity complicates\u00a0the securing of the\u00a0fleet and may\u00a0introduce\u00a0new exploitable\u00a0weak points\u00a0within the local network.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h1 aria-level=\"1\"><span data-contrast=\"none\">Levers\u00a0to\u00a0secure\u00a0next<\/span>\u2011<span data-contrast=\"none\">generation\u00a0charging\u00a0infrastructure<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h1>\n<p><span data-contrast=\"auto\">Securing next<\/span>\u2011<span data-contrast=\"auto\">generation charging infrastructures relies on a structured approach that makes it possible to reconcile operational performance with effective cybersecurity risk management.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p aria-level=\"2\"><span data-contrast=\"none\">Ensuring\u00a0the\u00a0resilience\u00a0of\u00a0charging\u00a0architecture<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The evolution of charging infrastructures introduces a single point of failure for CPOs: the EMS. To address this risk, it is necessary to design resilient architectures capable of\u00a0maintaining\u00a0continuity even\u00a0in the event of\u00a0an EMS failure. This can notably be achieved through:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">The implementation\u00a0<\/span><b><span data-contrast=\"auto\">of monitoring and alerting mechanisms<\/span><\/b><span data-contrast=\"auto\">, enabling rapid detection of EMS failures and activation of fallback\u00a0mechanisms.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">The deployment of\u00a0<\/span><b><span data-contrast=\"auto\">degraded operating modes<\/span><\/b><span data-contrast=\"auto\">, allowing charging stations to continue\u00a0operating\u00a0even\u00a0in the event of\u00a0EMS\u00a0unavailability.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:300}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">The definition of business continuity and disaster recovery strategies that explicitly include EMS failure scenarios.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:300}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Securing dependencies on unmanaged third<\/span><span data-contrast=\"none\">&#8211;<\/span><span data-contrast=\"none\">party infrastructures<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The evolution of charging infrastructure architectures requires CPOs to address both supply<\/span>\u2011<span data-contrast=\"auto\">chain<\/span>\u2011<span data-contrast=\"auto\">related risks and risks inherent to the interconnection between the CPMS and EMS vendors\u2019 cloud infrastructures.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To reduce supply<\/span>\u2011<span data-contrast=\"auto\">chain risks, CPOs must implement robust vendor qualification processes, including in particular:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">Assessment of the vendor\u2019s\u00a0<\/span><b><span data-contrast=\"auto\">cybersecurity maturity\u00a0level.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Evaluation of product security, notably through\u00a0<\/span><b><span data-contrast=\"auto\">penetration\u00a0testing<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Contractual governance of supplier relationships, including, where\u00a0appropriate, the implementation of\u00a0<\/span><b><span data-contrast=\"auto\">Security Assurance Plans (SAPs)<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Beyond supply<\/span>\u2011<span data-contrast=\"auto\">chain risk management, CPOs must also account for the risks introduced by the interconnection of their infrastructure with EMS vendors\u2019 environments (EMS cloud). Securing these interconnections requires\u00a0a strong\u00a0control of data flows between the CPO infrastructure and these external environments. This can be achieved through three main\u00a0levers:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">Implementing\u00a0<\/span><b><span data-contrast=\"auto\">traffic filtering and control mechanisms<\/span><\/b><span data-contrast=\"auto\">\u00a0between the local charging infrastructure network and external networks, to restrict communications strictly to legitimate third<\/span>\u2011<span data-contrast=\"auto\">party\u00a0infrastructures.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Formalizing\u00a0<\/span><b><span data-contrast=\"auto\">secure architectural standards<\/span><\/b><span data-contrast=\"auto\">\u00a0and ensuring their effective implementation during EMS deployment in the field,\u00a0guaranteeing\u00a0a consistent application of cybersecurity best\u00a0practices.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Implementing\u00a0<\/span><b><span data-contrast=\"auto\">isolation mechanisms<\/span><\/b><span data-contrast=\"auto\">\u00a0to\u00a0contain\u00a0potential EMS cloud failures and prevent their propagation across the entire charging infrastructure fleet.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Securing communications relying on industrial protocols<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Communications between EMS and energy<\/span>\u2011<span data-contrast=\"auto\">related equipment, particularly BESS, still largely rely on industrial protocols such as Modbus, which do not\u00a0provide\u00a0native security mechanisms. In this context, securing these exchanges cannot rely on the protocols themselves, but must instead be addressed at the infrastructure architecture level.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This notably involves:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<ul>\n<li><b><span data-contrast=\"auto\">Implementing strict network segmentation within the local network<\/span><\/b><span data-contrast=\"auto\">, isolating EMS, BESS, and other components to limit exposure\u00a0surfaces.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:276,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Applying fine<\/span><\/b>\u2011<b><span data-contrast=\"auto\">grained control over communications<\/span><\/b><span data-contrast=\"auto\">\u00a0by locally restricting data flows to strictly necessary exchanges (filtering, whitelisting, limitation of authorized commands).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:276,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Deploying communication monitoring mechanisms<\/span><\/b><span data-contrast=\"auto\">\u00a0to detect abnormal or unauthorized behavior.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:714,&quot;335559739&quot;:120,&quot;335559740&quot;:276,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Establishing a structured cybersecurity governance<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">To address the diversity of components and infrastructures\u00a0operated\u00a0across their charging networks, it is essential for CPOs to structure their environment around clear governance, including in particular:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul>\n<li><b><span data-contrast=\"auto\">Clarification\u00a0of<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><b><span data-contrast=\"auto\">cyber roles and responsibilities<\/span><\/b><span data-contrast=\"auto\">\u00a0across the entire value chain (CPOs, suppliers, service providers, etc.).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Definition of security standards applicable to all projects and suppliers, ensuring overall architectural consistency<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">By combining rigorous supplier risk management, a solid governance framework, and strict control of data flows, CPOs can fully\u00a0leverage\u00a0the operational gains offered by EMS while securing their infrastructure in a sustainable manner.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h1 aria-level=\"1\"><span data-contrast=\"none\">Optimizing\u00a0without\u00a0compromising: the challenge of\u00a0charging\u00a0infrastructure<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h1>\n<p><span data-contrast=\"auto\">To conclude, the rise of Energy Management Systems (EMS) is profoundly transforming charging infrastructures, providing essential optimization levers while also introducing new cybersecurity risks. For CPOs, the challenge is no longer limited to deploying these solutions but extends to securing them within a comprehensive approach that encompasses supplier risk management, the definition of secure architectures, and the establishment of structured cybersecurity governance. In this context,\u00a0<\/span><b><span data-contrast=\"auto\">cybersecurity is now\u00a0emerging\u00a0as a prerequisite for the sustainable performance of charging infrastructures.<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Electric mobility is experiencing rapid growth in France and across\u00a0Europe:\u00a0in January 2026, registrations of\u00a0fully\u00a0electric vehicles in France increased by more than 50% compared with January 2025, bringing their market share to\u00a0nearly one\u00a0third of total vehicle sales. This trajectory\u00a0confirms a structural\u00a0transformation\u00a0of&#8230;<\/p>\n","protected":false},"author":1499,"featured_media":29878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3922,3275,3274],"tags":[],"coauthors":[5042,5043,5041],"class_list":["post-29885","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-deep-dive-en","category-iot-consumer-goods-en","category-manufacturing-industry-4-0-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Electric mobility: charging infrastructure evolution, between energy optimization and emerging cybersecurity challenges - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Electric mobility: charging infrastructure evolution, between energy optimization and emerging cybersecurity challenges - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Electric mobility is experiencing rapid growth in France and across\u00a0Europe:\u00a0in January 2026, registrations of\u00a0fully\u00a0electric vehicles in France increased by more than 50% compared with January 2025, bringing their market share to\u00a0nearly one\u00a0third of total vehicle sales. This trajectory\u00a0confirms a structural\u00a0transformation\u00a0of...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-29T15:56:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-29T15:56:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/04\/pexels-mohamed-b-2151113020-33661082-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enzo KALALA, Antonin GIANELLA, Ludovic DEGRE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enzo KALALA, Antonin GIANELLA, Ludovic DEGRE\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/\"},\"author\":{\"name\":\"Madeline Salles\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ff9185abd0574dc00c0e378146212b8\"},\"headline\":\"Electric mobility: charging infrastructure evolution, between energy optimization and emerging cybersecurity challenges\",\"datePublished\":\"2026-04-29T15:56:17+00:00\",\"dateModified\":\"2026-04-29T15:56:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/\"},\"wordCount\":1863,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/04\/pexels-mohamed-b-2151113020-33661082-scaled.jpg\",\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Deep-dive\",\"IoT &amp; Consumer goods\",\"Manufacturing &amp; Industry 4.0\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/\",\"name\":\"Electric mobility: charging infrastructure evolution, between energy optimization and emerging cybersecurity challenges - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/04\/pexels-mohamed-b-2151113020-33661082-scaled.jpg\",\"datePublished\":\"2026-04-29T15:56:17+00:00\",\"dateModified\":\"2026-04-29T15:56:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/04\/pexels-mohamed-b-2151113020-33661082-scaled.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/04\/pexels-mohamed-b-2151113020-33661082-scaled.jpg\",\"width\":2048,\"height\":2560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Electric mobility: charging infrastructure evolution, between energy optimization and emerging cybersecurity challenges\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ff9185abd0574dc00c0e378146212b8\",\"name\":\"Madeline Salles\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/madeline-salles\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Electric mobility: charging infrastructure evolution, between energy optimization and emerging cybersecurity challenges - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/","og_locale":"en_US","og_type":"article","og_title":"Electric mobility: charging infrastructure evolution, between energy optimization and emerging cybersecurity challenges - RiskInsight","og_description":"Electric mobility is experiencing rapid growth in France and across\u00a0Europe:\u00a0in January 2026, registrations of\u00a0fully\u00a0electric vehicles in France increased by more than 50% compared with January 2025, bringing their market share to\u00a0nearly one\u00a0third of total vehicle sales. This trajectory\u00a0confirms a structural\u00a0transformation\u00a0of...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/","og_site_name":"RiskInsight","article_published_time":"2026-04-29T15:56:17+00:00","article_modified_time":"2026-04-29T15:56:18+00:00","og_image":[{"width":2048,"height":2560,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/04\/pexels-mohamed-b-2151113020-33661082-scaled.jpg","type":"image\/jpeg"}],"author":"Enzo KALALA, Antonin GIANELLA, Ludovic DEGRE","twitter_misc":{"Written by":"Enzo KALALA, Antonin GIANELLA, Ludovic DEGRE","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/"},"author":{"name":"Madeline Salles","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ff9185abd0574dc00c0e378146212b8"},"headline":"Electric mobility: charging infrastructure evolution, between energy optimization and emerging cybersecurity challenges","datePublished":"2026-04-29T15:56:17+00:00","dateModified":"2026-04-29T15:56:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/"},"wordCount":1863,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/04\/pexels-mohamed-b-2151113020-33661082-scaled.jpg","articleSection":["Cybersecurity &amp; Digital Trust","Deep-dive","IoT &amp; Consumer goods","Manufacturing &amp; Industry 4.0"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/","name":"Electric mobility: charging infrastructure evolution, between energy optimization and emerging cybersecurity challenges - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/04\/pexels-mohamed-b-2151113020-33661082-scaled.jpg","datePublished":"2026-04-29T15:56:17+00:00","dateModified":"2026-04-29T15:56:18+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/04\/pexels-mohamed-b-2151113020-33661082-scaled.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/04\/pexels-mohamed-b-2151113020-33661082-scaled.jpg","width":2048,"height":2560},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/electric-mobility-charging-infrastructure-evolution-between-energy-optimization-and-emerging-cybersecurity-challenges\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Electric mobility: charging infrastructure evolution, between energy optimization and emerging cybersecurity challenges"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ff9185abd0574dc00c0e378146212b8","name":"Madeline Salles","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/madeline-salles\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/29885","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1499"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=29885"}],"version-history":[{"count":3,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/29885\/revisions"}],"predecessor-version":[{"id":29888,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/29885\/revisions\/29888"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/29878"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=29885"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=29885"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=29885"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=29885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}