Former Pittsburgh Steeler Rocky Bleier To Keynote ESX 2010

Rocky Bleier, who played as running back on four Super Bowl winning Pittsburgh Steelers teams, will deliver the keynote luncheon address at the Electronic Security Expo, June 15-17 in Pittsburgh.

Bleier's keynote, "Leaning Forward Into Life," will share his journey from a soldier seriously wounded on the battlefields of Vietnam to starting running back for the Pittsburgh Steelers Super Bowl championship teams of the 1970s.

"Rocky Bleier is a true American hero, having overcome injuries that almost kept him from walking to becoming a football star only a few years later," said ESX Chairman, George De Marco. "His inspirational story will provide ESX attendees with the drive to perform exceptionally and improve their businesses."

While serving in the Army, Bleier was awarded the Purple Heart and Bronze Star. He is also the author of "Fighting Back," which was made into an ABC movie of the week in 1980.

The keynote luncheon will take place on Wednesday, June 16 at 12 p.m. in the David L. Lawrence Convention Center. Tickets to the luncheon can be purchased at http://www.esxweb.com/register.

Featured

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.