Podcast Summary: Electric Vehicles and EV Security
Cybersecurity Today – Holiday Weekend Edition
Host: Jim Love
Guests: David Shipley (Interviewer), Steve Visconti (CEO, Xiid Corporation)
Date: April 3, 2026
Episode Overview
This episode dives into the growing cybersecurity threats linked to electric vehicles (EVs) and, more specifically, EV charging infrastructure. David Shipley interviews Steve Visconti, CEO of Xiid Corporation, focusing on how the rapid deployment of charging networks creates new vulnerabilities for individuals, businesses, and critical infrastructure. The discussion covers the industry’s state of readiness, the complexity of EV systems, policy concerns, and evolving approaches to protecting the EV ecosystem from potential attacks that could cause physical, financial, and societal harm.
Key Discussion Points & Insights
1. Introduction to Critical Infrastructure Security
- Steve Visconti introduces Xiid Corporation (01:46–02:30):
- Focuses on securing critical infrastructure at the application layer, with emphasis on environments supporting web applications, virtual machines, containers, and especially operational technology (OT)/IoT like EV chargers.
- “We try to defend ... from all of these attacks that you’re familiar with and some you’re not.” (01:52–02:13)
2. The Growing Importance of EV Charging Infrastructure
- EV charging industry highlighted as a major, global sector (03:50–04:44):
- Expansion beyond city centers to hospitality, enterprise campuses, and government projects.
- Environmental and policy drivers lead to rapid EV adoption with new, under-addressed cybersecurity risks.
3. Misunderstanding the Real Risks
- Public perception vs actual threats (06:40–08:08):
- Common misconception: “What's the worst that can happen? Someone steals some power.”
- Real concern: chargers are integral to networks tied into homes, utilities, and even the power grid. Vulnerabilities open pathways to disrupt essential services.
- ”It isn’t the power supply, it’s all the control systems, the billing systems, and the back-office systems that have become vulnerable.” (07:34–07:50, Steve Visconti)
4. Grid Disruption and Security Nightmares
- Potential for widespread, coordinated attacks (08:35–09:14):
- Attackers could leverage vehicle-to-grid communication to disrupt or destabilize power delivery at scale.
- Attack surface multiplies with every added charger, and not all are adequately protected.
5. Real-World Exploits and Safety Concerns
- Examples and trends (fires and back-office attacks) (09:54–11:08):
- Anecdotes of home charger fires linked to exploited vulnerabilities.
- Main threat is not residential but commercial and fleet-scale systems, where a single breach can affect thousands of units or even jump into broader networks.
- “If they can get into the network, the control plane, the back office of an EV charging system... they can take down all of their back office that's residing in AWS or someplace else.” (11:30–12:01, Steve Visconti)
6. Xiid’s Security Approach: Beyond Firewalls
- A new paradigm in protection (12:14–14:37):
- Critique of traditional firewalls, patch cycles, and how current protection is insufficient for evolving threats.
- Xiid’s method: eliminate reachability. Only known, registered users or machines may access systems—no open ports or static IPs for attackers to target.
- “Let's design systems that are not reachable, but only invite in specific allowed users, if you will, or machines.” (13:21–13:31, Steve Visconti)
- Contrast with old mindset of “build the Internet and add firewalls”; instead, architect systems to never be generally reachable.
7. The Charger as a Threat Vector
- Connected cars, ECUs, and the risk of chained attacks (14:37–17:02):
- Modern EVs have dozens of electronic control units (ECUs). Malware can lurk on these devices pre-installed, posing future risk as vehicles are built and deployed.
- “Control units are computers. If somebody were to put nefarious malware on that control unit, it can sit there for years ... to do something really bad.” (15:56–16:22, Steve Visconti)
- Discussion about state actors potentially planting long-term exploits, and the difficulty of ensuring all components in an international supply chain are clean.
8. Policy & Government Vulnerabilities: The Electronic Kill Switch
- US legislation mandating government-accessible vehicle kill switches (00:23–00:58, 22:50–24:34):
- New laws will require remote vehicle disablement capabilities.
- Major concern: nation-state or criminal attackers could potentially exploit these kill switches at scale, causing massive disruption (ex: 100,000 cars disabled simultaneously).
- “Can you imagine if that kill switch hit 100,000 cars at one time, what that would do?” (00:47–00:58, Steve Visconti)
- “Are we like one underpaid intern’s agentic AI coding tool away from 100,000 cars getting turned off because ... whoops?” (24:02–24:21, David Shipley)
9. Municipality and Vendor Awareness—A Work in Progress
- Industry and government readiness (18:27–20:21):
- Some actors are waking up to risks (ex: CISA guidance, industry consortia).
- However, procurement and RFQs may not always prioritize security, especially with tight budgets and lack of expertise.
- “There’s this thing called optimism bias where we always think bad things happen to somebody else... but I think you’ve made a really interesting case here.” (20:26–20:47, David Shipley)
10. Attacks Are Already Happening
- DDoS and cloud-side incidents (22:04–22:34):
- Real attacks against charging networks and their supporting cloud infrastructure are occurring.
- Industry attention at recent conferences indicates a growing awareness, but the threat is rapidly morphing.
Notable Quotes & Memorable Moments
-
On Electronic Kill Switches and Policy Risks:
“The bad driver didn’t pay his whatever his alimony and we’re going to kill his car. I’m okay with that. But what are the state sponsored actors already planning and working on?”
(00:36–00:56, Steve Visconti)
-
On Infrastructure Security Reality:
“It isn’t the power supply, it’s all the control systems, the billing systems, and the back-office systems that have become vulnerable. That’s what the nefarious actors are looking at.”
(07:34–07:50, Steve Visconti)
-
On Traditional Security Models:
“We built this thing that we call the public Internet. And now here comes a company like ours ... let’s design systems that are not reachable.”
(13:16–13:31, Steve Visconti)
-
On the Supply Chain and Nation State Threats:
“If somebody were to put nefarious malware on that control unit, it can sit there for years waiting for the rest of it to be built out within a network.”
(15:56–16:22, Steve Visconti)
-
On Human Nature and Risk Blindness:
“There’s this thing called optimism bias where we always think bad things happen to somebody else...”
(20:26–20:35, David Shipley)
-
On Real-World Incidents:
“We’ve also seen attacks on the cloud, back in at AWS. So, yes, it is happening. It is very much happening.”
(22:22–22:30, Steve Visconti)
Timestamps for Important Segments
| Segment | Time |
| ----------------------------------------------|------------ |
| EV charging as a cybersecurity threat | 03:36–06:46 |
| Vehicle-to-grid vulnerabilities | 06:46–09:14 |
| Commercial infrastructure vs. home risks | 10:43–11:08 |
| Firewalls vs. new approaches | 12:14–14:37 |
| Car-to-charger attack scenarios | 14:37–17:02 |
| Policy and electronic kill switch | 22:50–24:34 |
| DDoS/cloud-backend incidents—real examples | 22:04–22:34 |
| Notable energy grid disruptions—past & future | 08:08–09:14 |
Conclusion: Final Thoughts
- Urgency: EV charging infrastructure is expanding rapidly, but security understandably lags behind functionality and adoption.
- New Security Paradigm Needed: Xiid and others advocate moving beyond reactive security tools (like firewalls) to proactive architectures that eliminate unnecessary access and reduce attack surfaces.
- Policy Blind Spots: Well-intended government mandates (like vehicle kill switches) may introduce massive new risks if not designed and secured properly.
- Incident Response: While awareness is growing in government and industry, procurement can lag, and attackers are already probing these networks for weaknesses.
- Call to Action: Manufacturers, municipalities, and operators must recognize the systemic risk and work with cybersecurity partners to secure both their physical and digital assets.
This episode provides foundational knowledge and encourages anyone involved in the EV space—policy, operations, or manufacturing—to take cybersecurity threats seriously and adopt new models of protection before a major incident occurs.