Managing and Transitioning Disparate Cyber Architectures