{"id":27,"date":"2024-07-31T14:19:17","date_gmt":"2024-07-31T14:19:17","guid":{"rendered":"https:\/\/threatassessmentconsultants.com\/?page_id=27"},"modified":"2026-03-04T18:07:51","modified_gmt":"2026-03-04T18:07:51","slug":"about-us","status":"publish","type":"page","link":"https:\/\/threatassessmentconsultants.com\/?page_id=27","title":{"rendered":"About Us"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-669513ed wp-block-group-is-layout-constrained\" style=\"background-color:#c3c3c3;margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-1da03c2a wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<div class=\"wp-block-group is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-444d5ee8 wp-block-group-is-layout-flex\" style=\"min-height:100%\">\n<p class=\"has-heading-font-family has-large-font-size\" style=\"line-height:1.2\"><strong>Threat Assessment Consultants is a leading provider of expert threat management services, specializing in safeguarding individuals and organizations from various types of threats, including stalking, workplace violence, and harassment. <\/strong><\/p>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-9fe8ed88 wp-block-group-is-layout-constrained\">\n<p class=\"wp-container-content-0733e5d0\">Our mission is to empower our clients with the knowledge and strategies needed to effectively manage and mitigate risks, ensuring a safer and more secure environment.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/threatassessmentconsultants.com\/?page_id=29\">Contact Us<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--1\"><img decoding=\"async\" src=\"https:\/\/threatassessmentconsultants.com\/wp-content\/themes\/twentytwentyfour\/assets\/images\/museum.webp\" alt=\"A ramp along a curved wall in the Kiasma Museu, Helsinki, Finland\" style=\"aspect-ratio:3\/4;object-fit:cover\"\/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-base-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-d89aad35 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-549b0c86 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-global-padding is-content-justification-left is-layout-constrained wp-container-core-column-is-layout-4f15e8fe wp-block-column-is-layout-constrained\" style=\"flex-basis:40%\">\n<p><strong>&nbsp;Our Expertise<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-119bc444 wp-block-column-is-layout-flow\" style=\"flex-basis:60%\">\n<p class=\"has-heading-font-family has-large-font-size\" style=\"line-height:1.2\">With a focus on stalking cases and complex threat scenarios, our team brings a wealth of experience and specialized knowledge to every situation. We offer comprehensive threat assessments, tailored safety strategies, and insightful training programs designed to address the unique challenges of each case. <\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-87beb0d0 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"wp-container-content-9cfa9a5a\">&#8211; Threat Assessments: Detailed evaluations of threats to understand risk levels and behavior patterns, providing essential insights for effective risk management.<\/p>\n\n\n\n<p>&#8211; Safety Management Reports: Customized strategies to reduce risks and enhance security based on the threat assessment findings.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>&#8211; Group Training: Interactive and engaging training sessions for HR personnel, security teams, and frontline managers to improve threat recognition and response.The revitalized Art Gallery is set to redefine the cultural landscape of Toronto, serving as a nexus of artistic expression, community engagement, and architectural marvel. The expansion and renovation project pay homage to the Art Gallery&#8217;s rich history while embracing the future, ensuring that the gallery remains a beacon of inspiration.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-base-2-color has-contrast-background-color has-text-color has-background has-link-color wp-elements-0aca1305e1b1b10d4e83cda68ace7b68 has-global-padding is-layout-constrained wp-container-core-group-is-layout-d89aad35 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-1da03c2a wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:60%\">\n<figure class=\"wp-block-image size-full is-style-rounded wp-duotone-duotone-1 is-style-rounded--2\"><img decoding=\"async\" src=\"https:\/\/threatassessmentconsultants.com\/wp-content\/themes\/twentytwentyfour\/assets\/images\/abstract-geometric-art.webp\" alt=\"White abstract geometric artwork from Dresden, Germany\" style=\"aspect-ratio:4\/3;object-fit:cover\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40%\">\n<h2 class=\"wp-block-heading\">&nbsp;Our Commitment<\/h2>\n\n\n\n<p>At Threat Assessment Consultants, our commitment is to support and empower you through expert assessments, strategic guidance, and proactive training. We understand the complexities of managing threats and are dedicated to providing the tools and support you need to navigate these challenges effectively.<\/p>\n\n\n\n<p>For more information on how we can assist you, please contact us today. Together, we can create a safer and more secure environment for you and your organization.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-contrast-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/threatassessmentconsultants.com\/?page_id=29\" style=\"background-color:#c3c3c3\">Contact Us<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Threat Assessment Consultants is a leading provider of expert threat management services, specializing in safeguarding individuals and organizations from various types of threats, including stalking, workplace violence, and harassment. Our mission is to empower our clients with the knowledge and strategies needed to effectively manage and mitigate risks, ensuring a safer and more secure environment. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-27","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>About Us - Threat Assessment Consultants<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/threatassessmentconsultants.com\/?page_id=27\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"About Us - Threat Assessment Consultants\" \/>\n<meta property=\"og:description\" content=\"Threat Assessment Consultants is a leading provider of expert threat management services, specializing in safeguarding individuals and organizations from various types of threats, including stalking, workplace violence, and harassment. Our mission is to empower our clients with the knowledge and strategies needed to effectively manage and mitigate risks, ensuring a safer and more secure environment. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/threatassessmentconsultants.com\/?page_id=27\" \/>\n<meta property=\"og:site_name\" content=\"Threat Assessment Consultants\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-04T18:07:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/threatassessmentconsultants.com\/wp-content\/themes\/twentytwentyfour\/assets\/images\/museum.webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/threatassessmentconsultants.com\/?page_id=27\",\"url\":\"https:\/\/threatassessmentconsultants.com\/?page_id=27\",\"name\":\"About Us - Threat Assessment Consultants\",\"isPartOf\":{\"@id\":\"http:\/\/threatassessmentconsultants.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/threatassessmentconsultants.com\/?page_id=27#primaryimage\"},\"image\":{\"@id\":\"https:\/\/threatassessmentconsultants.com\/?page_id=27#primaryimage\"},\"thumbnailUrl\":\"https:\/\/threatassessmentconsultants.com\/wp-content\/themes\/twentytwentyfour\/assets\/images\/museum.webp\",\"datePublished\":\"2024-07-31T14:19:17+00:00\",\"dateModified\":\"2026-03-04T18:07:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/threatassessmentconsultants.com\/?page_id=27#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/threatassessmentconsultants.com\/?page_id=27\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/threatassessmentconsultants.com\/?page_id=27#primaryimage\",\"url\":\"https:\/\/threatassessmentconsultants.com\/wp-content\/themes\/twentytwentyfour\/assets\/images\/museum.webp\",\"contentUrl\":\"https:\/\/threatassessmentconsultants.com\/wp-content\/themes\/twentytwentyfour\/assets\/images\/museum.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/threatassessmentconsultants.com\/?page_id=27#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/threatassessmentconsultants.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"About Us\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/threatassessmentconsultants.com\/#website\",\"url\":\"http:\/\/threatassessmentconsultants.com\/\",\"name\":\"Threat Assessment Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"http:\/\/threatassessmentconsultants.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/threatassessmentconsultants.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/threatassessmentconsultants.com\/#organization\",\"name\":\"Threat Assessment Consultants\",\"url\":\"http:\/\/threatassessmentconsultants.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/threatassessmentconsultants.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/threatassessmentconsultants.com\/wp-content\/uploads\/2024\/07\/logo-final-2-scaled.png\",\"contentUrl\":\"https:\/\/threatassessmentconsultants.com\/wp-content\/uploads\/2024\/07\/logo-final-2-scaled.png\",\"width\":2560,\"height\":1121,\"caption\":\"Threat Assessment Consultants\"},\"image\":{\"@id\":\"http:\/\/threatassessmentconsultants.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"About Us - Threat Assessment Consultants","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/threatassessmentconsultants.com\/?page_id=27","og_locale":"en_US","og_type":"article","og_title":"About Us - Threat Assessment Consultants","og_description":"Threat Assessment Consultants is a leading provider of expert threat management services, specializing in safeguarding individuals and organizations from various types of threats, including stalking, workplace violence, and harassment. Our mission is to empower our clients with the knowledge and strategies needed to effectively manage and mitigate risks, ensuring a safer and more secure environment. [&hellip;]","og_url":"https:\/\/threatassessmentconsultants.com\/?page_id=27","og_site_name":"Threat Assessment Consultants","article_modified_time":"2026-03-04T18:07:51+00:00","og_image":[{"url":"https:\/\/threatassessmentconsultants.com\/wp-content\/themes\/twentytwentyfour\/assets\/images\/museum.webp","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/threatassessmentconsultants.com\/?page_id=27","url":"https:\/\/threatassessmentconsultants.com\/?page_id=27","name":"About Us - Threat Assessment Consultants","isPartOf":{"@id":"http:\/\/threatassessmentconsultants.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/threatassessmentconsultants.com\/?page_id=27#primaryimage"},"image":{"@id":"https:\/\/threatassessmentconsultants.com\/?page_id=27#primaryimage"},"thumbnailUrl":"https:\/\/threatassessmentconsultants.com\/wp-content\/themes\/twentytwentyfour\/assets\/images\/museum.webp","datePublished":"2024-07-31T14:19:17+00:00","dateModified":"2026-03-04T18:07:51+00:00","breadcrumb":{"@id":"https:\/\/threatassessmentconsultants.com\/?page_id=27#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/threatassessmentconsultants.com\/?page_id=27"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/threatassessmentconsultants.com\/?page_id=27#primaryimage","url":"https:\/\/threatassessmentconsultants.com\/wp-content\/themes\/twentytwentyfour\/assets\/images\/museum.webp","contentUrl":"https:\/\/threatassessmentconsultants.com\/wp-content\/themes\/twentytwentyfour\/assets\/images\/museum.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/threatassessmentconsultants.com\/?page_id=27#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/threatassessmentconsultants.com\/"},{"@type":"ListItem","position":2,"name":"About Us"}]},{"@type":"WebSite","@id":"http:\/\/threatassessmentconsultants.com\/#website","url":"http:\/\/threatassessmentconsultants.com\/","name":"Threat Assessment Consultants","description":"","publisher":{"@id":"http:\/\/threatassessmentconsultants.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/threatassessmentconsultants.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/threatassessmentconsultants.com\/#organization","name":"Threat Assessment Consultants","url":"http:\/\/threatassessmentconsultants.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/threatassessmentconsultants.com\/#\/schema\/logo\/image\/","url":"https:\/\/threatassessmentconsultants.com\/wp-content\/uploads\/2024\/07\/logo-final-2-scaled.png","contentUrl":"https:\/\/threatassessmentconsultants.com\/wp-content\/uploads\/2024\/07\/logo-final-2-scaled.png","width":2560,"height":1121,"caption":"Threat Assessment Consultants"},"image":{"@id":"http:\/\/threatassessmentconsultants.com\/#\/schema\/logo\/image\/"}}]}},"brizy_media":[],"_links":{"self":[{"href":"https:\/\/threatassessmentconsultants.com\/index.php?rest_route=\/wp\/v2\/pages\/27","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/threatassessmentconsultants.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/threatassessmentconsultants.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/threatassessmentconsultants.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/threatassessmentconsultants.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=27"}],"version-history":[{"count":3,"href":"https:\/\/threatassessmentconsultants.com\/index.php?rest_route=\/wp\/v2\/pages\/27\/revisions"}],"predecessor-version":[{"id":162,"href":"https:\/\/threatassessmentconsultants.com\/index.php?rest_route=\/wp\/v2\/pages\/27\/revisions\/162"}],"wp:attachment":[{"href":"https:\/\/threatassessmentconsultants.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=27"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}