Cloud & cybersecurity Technical leader, Cyber Investigator, Ethical hacker and Entreprenuer

Cloud & cybersecurity Technical leader, Cyber Investigator, Ethical hacker and Entreprenuer
I work with top agencies and brands worldwide








What Drives Me
Getting Things Done
Developing scalable, human-centric solutions that integrate technology, people, and processes seamlessly.
Smart &
Practical
I adopt a smart and practical approach to problem-solving, ensuring efficiency without compromising human needs.
Transformational Leadership
I enjoy establishing guidelines, leading significant changes, and fostering teamwork to build trust.
Meaningful Impact
By tackling complex problems and driving positive change, I create solutions that achieve key objectives.
A Legacy of Excellence
My work involves addressing challenging situations and leading major digital projects. I prioritize understanding others, fostering teamwork, and continuously seeking improvement. My goal is to assist individuals and groups in achieving their objectives while also establishing systems for future success and growth.
The Journey of Innovation & Leadership

Founder and Chairman
FNA Group
FNA Group, an African consulting firm focused on intelligence and cybersecurity, with subsidiaries.

Founder Addicnet
2010: Founded Addicnet, a Top-tier technology engineering team as a service and an exclusive talent subscription service.
Global Operations: Addicnet currently operates in 5 countries – Rwanda, Nigeria, South Africa, Ghana, and the U.S.A.
Industry Recognition: Awarded as one of Africa’s most promising technology companies in 2020.

Fractional Leadership Role
Regional Director – Africa TAM-C INTELLIGENCE
TAM-C Intelligence, a global firm providing intelligence & cybersecurity solutions to governments & intelligence agencies.
My background
I am affectionately known as Dico, a nickname derived from my surname, Addico. My full name is Freeman Nartey Nene Addico. I was born in 1977, into the Addico family in Ningo-Prampram, a coastal city in the Greater Accra Region of Ghana.
My career began in 2001 as a Systems Administrator, where I held a hands-on role focused on technical security, networking, coding, and infrastructure management, including skills in hacking. Since then, I have held various C-level positions in Africa and beyond, specifically in cloud computing, cybersecurity, and project management, across eight countries.
Professionally, I was trained and certified in different aspects of cloud and cybersecurity, ie. CCSP – Certified Cloud Security Professional, CISSP – Certified Information Systems Security Professional, CISM – Certified Information Security Manager, CEH – Certified Ethical Hacker.
Educationally, I was trained in computer science and Cybersecurity & forensics

My businesses





Success stories
Dont just take it from me
Real stories from clients who’ve benefited from the solutions
The Personalized Service
What impressed me most was the personalized approach. This wasn’t a one-size-fits-all solution; it was carefully designed around my unique digital footprint and lifestyle. It feels like having a dedicated cybersecurity chief of staff just for me.
The Trust & Loyalty
In today’s world, trust is hard to find. The concierge team has completely earned my trust with their unmatched professionalism, discretion, and expertise. I can’t imagine managing my personal and professional digital life without their assistance.
The Confidential Peace-of-Mind
“As a high-profile executive, I have always been concerned about my family’s digital privacy. Thanks to Freeman and the concierge team, I no longer worry about issues like personal data leaks, identity theft, or targeted cyberattacks. Their discreet, white-glove service has provided me with true peace of mind.”
The Reputation-Saver
“This is one of the most valuable services I’ve ever invested in. They not only protected my online presence but also proactively removed potential threats before they could harm my reputation. For someone who is constantly in the public eye, that level of foresight is priceless.”
The Lifestyle Protection
“I travel frequently and use multiple devices every day, which makes me a prime target for security threats. The concierge service ensures that my digital life is as secure as my physical security measures. It acts as an invisible shield, protecting me wherever I go.”

Families protect their gadgets and home internet to prevent information-sensitive leaks because company security measures don’t cover their private lives.

Intelligence services, which included direct threat monitoring, regional alerts, weekly intelligence briefings, and sentiment analysis reports, benefited corporate executives.

A CEO secures his communications and other top executives in the company with a military-grade end-to-end encrypted mobile device to avoid cyber threats, surveillance, and corporate espionage.

A government secures all appointees’ devices, home networks, and social media to avoid sensitive data breaches, and brand impersonations from threat actors.
Customer Use Cases
Your digital is at risk, subscribe to the digital executive protection conciege to protect your brand and corporations.
Frequently Asked Questions
How do your cybersecurity offerings work?
It’s like having a security guard working for you all the time. Why not have the same privacy and safety online as you do in your secure, expensive homes that have security? We can help you get that same level of protection online. You get white-glove customer service, full transparency, and on-demand expert support in both their for work and personal lives.personalized onboarding, personal SOC, actionable alerts, AD HOC concierge support, ongoing education & training and monthly status emails.
Who is the ideal customer profiling for the solutions?
Our services are not intended for individuals who are not high-income earners or are just starting their professional journey. They are not specifically designed for young professionals in the initial phases of their careers. High-earning individuals with substantial wealth turn to our services. These are successful professionals who highly value their security and privacy and possess significant financial means.
Apart from high-profile Individuals, do you have solutions for businesses?
Cybercriminals now regularly target the personal cybersecurity of company leaders and Government officials with access to finances, confidential information, and proprietary data. However, enterprise security cannot extend into personal lives. My solution to this gap is protecting your organization from cyber risks originating in an executive’s personal life while also protecting the executive and their family from targeted cyberattacks, digital fraud, identity theft, reputation damage, physical threats, and other damages and disruptions.
What is the pricing for the solutions?
All the solutions are customized based on the scope of services needed hence pricing can only be determined based on requirements from the client. However, to give you a rough idea, it ranges between $250-$450 per hour.
Is it a subscription-based model service?
We have two different models, a project-based model, and a subscription-based model. Talk to the team to assess your security and privacy needs.