Transition of Threats

Similar to the transition of Primary Assets, Threats are transitioned by selecting the "Cybersecurity Transition" in the transitions menu. See below an example on threat transition from operational to system level: