Successful deployment of effective cyber security measures requires incorporation and adaptation of the ICS staff. The ICS environment has had 20+ years to adopt COTS and IT standards and repurpose these technology on a separate path from the traditional IT security evolution. Combine that with the activities and responsibilities of the ICS users, introducing cyber security into these environments requires more then simply selecting and tweaking new or existing technologies. Though some preferred methods used within ICS may seem inappropriate, adaptation, when appropriate, to different methods can and will be difficult. Improving cyber security effectiveness involves an exploration into the unique characteristics of the Industrial Control System 'user' with the balance of business risk and operational risk. From real world experience, the 4D's (Determine, Decide, Design and Deploy) describes the development and improvement process uniquely faced within ICS cyber security controls.