This document provides a summary of managing data when mobile. It discusses selecting an appropriate framework like NIST or ISO, partnering across IT to identify power users, and understanding what data needs to be managed. It also covers establishing an appropriate risk appetite by identifying risks to critical resources and maintaining a risk register. Finally, it suggests tools like user behavior analytics and identity and access management, as well as the importance of security engagement through one-on-one meetings with executives.