Mitigating Information Security Risks during Operation Transition